I have updated WiLink 8 driver to MCP8.5 SP2 and applied hostap patch provided in the update package but the open source KRACK test scripts still show that the client is vulnerable.
Test Details:
I ran the test using ./krack-test-client.py --replay-broadcast
command and it shows following messages in the test log:
Client accepts replayed broadcast frames (this is bad).
Fix this before testing for group key (re)installations!
I have attached a text file named krack-test-client.py --replay-broadcast.txt that contains full log of the test using ./krack-test-client.py --replay-broadcast command. (Use preferably Notepad++ for neat view).
Similarly, wpa_supplicant log file of the WiLink8 client is attached with the name wpa_supplicant_log --replay-broadcast test.txt.
On the other hand, if I use old WiLink8 driver for the same test it shows following messages in the test log:
Client accepts replayed broadcast frames (this is bad).
Fix this before testing for group key (re)installations!
After sometime it says:
Client DOESN'T accept replayed broadcast frames (this is good)
To see full log of the test script for old driver see attached file named krack-test-client.py_unpatched --replay-broadcast.txt and for wpa_supplicant log for WiLink8 client using old driver see attached file named wpa_supplicant_log_unpatched --replay-broadcast test.txt.
KERN_INFO: TI WiLink 1283 SDIO: Driver loaded
*** Nucleus Shell ***
SHELL:\>wpa_supplicant v2.1-devel
Global control interface '/var/run/wpa_supplicant'
STA Demo Application
*** Waiting for a STA interface
KERN_INFO: TIWLAN: Found TI/WLAN SDIO controller (vendor 0x4076, device 0x8032b32c, class 0x0)
Setting up SDIO parameters.
SDIO currently running at: 25000000
Configured clock: 25000000, Maximum clock: 52000000
Multi-block capable
Bytes Per Block: 2048 bytes, Block Count:512
Allocating Slot current: 130 mA
Device registered: tiw_drv
+---------------------------+
| wlan_loader: initializing |
+---------------------------+
enable_user_defaults = y !!
KERN_INFO: TIWLAN: 3.000000: cmdInterpret_ConvertAndExecute: DRIVER_START in STOPPED state - handle it
KERN_INFO: TIWLAN: 3.000000: Working on a 185x board.
KERN_INFO: TIWLAN: 3.000000: *******************************************
KERN_INFO: TIWLAN: 3.000000: wl18xx HW: RDL 183x or 180x, PG 2.2 (ROM 0x11)
KERN_INFO: TIWLAN: 3.000000: *******************************************
KERN_INFO: TIWLAN: 3.000000:
****** ClockConfig=0x100 *****
KERN_INFO: TIWLAN: 3.000000:
****** clock_config_freq=0x5 *****
KERN_INFO: TIWLAN: 3.000000:
****** enable both PLLs (WCS and COEX) in the top *****
KERN_INFO: TIWLAN: 3.000000:
****** disable the COEX PLL in the top *****
KERN_INFO: TIWLAN: 3.000000:
****** Locking the PLL *****
KERN_INFO: TIWLAN: 3.000000: Finished downloading firmware.
KERN_INFO: TIWLAN: 3.000000: Firmware running.
Device registered: tiw_sta
KERN_INFO: TIWLAN: 3.000000: wlanDrvIf_Open(), network interface ID=1
Device registered: tiw_sap
KERN_INFO: TIWLAN: 3.000000: wlanDrvIf_Open(), network interface ID=2
KERN_INFO: TIWLAN: 3.000000:
KERN_INFO: TIWLAN: 3.000000: --------------------------------------------------------------------
KERN_INFO: TIWLAN: 3.000000: Driver Version : MCP-8.0.0.47_Release
KERN_INFO: TIWLAN: 3.000000: Firmware Version: Rev 8.9.0.0.38
KERN_INFO: TIWLAN: 3.000000: PHY FW Version : Rev 8.2.0.0.227
KERN_INFO: TIWLAN: 3.000000: WLAN MAC Address: 78-A5-04-26-95-28
KERN_INFO: TIWLAN: 3.000000: --------------------------------------------------------------------
KERN_INFO: TIWLAN: 3.000000:
KERN_INFO: TIWLAN: 4.000000: Interrogate TX/RX parameters
KERN_INFO: TIWLAN: 4.000000: cmdInterpret_ServiceCompleteCB: AsyncCmd is NULL!!
KERN_INFO: TIWLAN: 4.000000: rolesMngr , CONSOLE
enableRole(): ifmode = 2
Device registered: tiw_p2pdev
Device registered: tiw_p2pgrp
Device registered: tiw_ibss
Initializing interface 'tiw_sta' conf 'wpa_sup.cfg' driver 'wilink' ctrl_interface 'N/A' bridge 'N/A'
Reading configuration file 'wpa_sup.cfg'
ctrl_interface='/var/run/wpa_supplicant'
ap_scan=1
Priority group 0
id=0 ssid='test_AP_1'
Reading configuration file '(null)'
Failed to open config file '(null)', error: Success
HOSTAPTIW wilink_global_init: enter
HOSTAPTIW wilink_if_init: enter ifname = tiw_sta
HOSTAPTIW : driver capabilities: key_mgmt 0x6f enc 0xf flags 0x90626a40
HOSTAPTIW wilink_if_init: assigned driver role 1 to the interface
HOSTAPTIW tiwdrv_enable_role: enter
In prepare_enable_role_buff: roleType --> 1
KERN_INFO: TIWLAN: 4.000000: rolesMngr , CONSOLE
enableRole(): ifmode = 1
HOSTAPTIW wilink_toggle_events: enter role = 1 mode = 115
Add interface tiw_sta to a new radio N/A
tiw_sta: Own MAC address: 78:a5:04:26:95:28
HOSTAPTI wilink_set_key: enter
HOSTAPTI wilink_set_key: enter
HOSTAPTI wilink_set_key: enter
HOSTAPTI wilink_set_key: enter
tiw_sta: RSN: flushing PMKID list in the driver
HOSTAPTIW wilink_flush_pmkid: enter
tiw_sta: Total active networks 1
tiw_sta: Added interface tiw_sta
tiw_sta: State: DISCONNECTED -> DISCONNECTED
wilink_set_operstate: operstate 0->0 (DORMANT)
tiw_sta: Starting delayed sched scan
tiw_sta: Add wildcard SSID to sched_scan
tiw_sta: add to filter ssid: test_AP_1
tiw_sta: Starting sched scan: short interval 5 long_interval 30 num_short_intervals 10
HOSTAPTI wilink_driver_sched_scan: enter
HOSTAPTIW init_connection_scan_params: num channels 38
tiwdrv_connection_scan. Scan params are set! uSsidNum = 1
HOSTAPTI: Sched scan requested (ret=0) intervals: short=5000 ms long=30000 ms num_short_intervals=10
*** STA interface detected
tiw_sta: Signal 1 received - reconfiguring
Reading configuration file 'wpa_sup.cfg'
Priority group 5
id=0 ssid='TI_AP'
Reading configuration file '(null)'
Failed to open config file '(null)', error: Success
tiw_sta: State: DISCONNECTED -> DISCONNECTED
wilink_set_operstate: operstate 0->0 (DORMANT)
tiw_sta: Setting scan request: 0 sec 0 usec
tiw_sta: Reconfiguration completed
tiw_sta: State: DISCONNECTED -> SCANNING
tiw_sta: Starting AP scan for wildcard SSID
HOSTAPTI wilink_scan: enter
HOSTAPTI tiwdrv_scan: enter
*** Successfully loaded a new wpa_supplicant configuration
Scan requested (ret=0) - scan timeout 30 seconds
HOSTAPTIW wilink_wireless_event_custom: event=5
HOSTAPTIW wilink_wireless_event_custom: SCAN_COMPLETE event
tiw_sta: Event SCAN_RESULTS (3) received
HOSTAPTI wilink_get_scan_results: enter
Received 11132 bytes of scan results (35 BSSes)
tiw_sta: BSS: Start scan result update 1
tiw_sta: BSS: Add new id 0 BSSID c4:e9:84:d8:98:96 SSID 'TI_AP'
tiw_sta: BSS: Add new id 1 BSSID 84:d4:7e:e6:17:b0 SSID 'MGC'
tiw_sta: BSS: Add new id 2 BSSID 84:d4:7e:e6:14:d0 SSID 'MGC'
tiw_sta: BSS: Add new id 3 BSSID f8:d1:11:70:3a:fe SSID 'testap'
tiw_sta: BSS: Add new id 4 BSSID 84:d4:7e:e6:13:10 SSID 'MGC'
tiw_sta: BSS: Add new id 5 BSSID 84:d4:7e:e6:17:a0 SSID 'MGC'
tiw_sta: BSS: Add new id 6 BSSID 84:d4:7e:e6:14:c0 SSID 'MGC'
tiw_sta: BSS: Add new id 7 BSSID a8:e7:05:f0:5d:05 SSID 'Adnan-Zong'
tiw_sta: BSS: Add new id 8 BSSID 96:53:30:41:30:41 SSID 'DIRECT-41-HP M477 LaserJet'
tiw_sta: BSS: Add new id 9 BSSID 84:d4:7e:e6:13:00 SSID 'MGC'
tiw_sta: BSS: Add new id 10 BSSID 84:d4:7e:e6:11:00 SSID 'MGC'
tiw_sta: BSS: Add new id 11 BSSID 84:d4:7e:e6:12:c0 SSID 'MGC'
tiw_sta: BSS: Add new id 12 BSSID 84:d4:7e:e6:22:50 SSID 'MGC'
tiw_sta: BSS: Add new id 13 BSSID 84:d4:7e:e6:11:10 SSID 'MGC'
tiw_sta: BSS: Add new id 14 BSSID 28:8a:1c:29:46:82 SSID 'NCWL_E_Conf_2'
tiw_sta: BSS: Add new id 15 BSSID 84:d4:7e:e6:17:20 SSID 'MGC'
tiw_sta: BSS: Add new id 16 BSSID 84:d4:7e:e6:22:90 SSID 'MGC'
tiw_sta: BSS: Add new id 17 BSSID 70:4f:57:5f:1c:74 SSID 'MUZAFFAR-LAW'
tiw_sta: BSS: Add new id 18 BSSID 6c:b7:49:27:81:ea SSID 'HUAWEI-81EA'
tiw_sta: BSS: Add new id 19 BSSID 84:d4:7e:e6:17:b1 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 20 BSSID 84:d4:7e:e6:14:d1 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 21 BSSID 84:d4:7e:e6:13:11 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 22 BSSID 84:d4:7e:e6:17:a1 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 23 BSSID 84:d4:7e:e6:14:c1 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 24 BSSID 84:d4:7e:e6:13:01 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 25 BSSID 84:d4:7e:e6:11:21 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 26 BSSID 84:d4:7e:e6:12:c1 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 27 BSSID 84:d4:7e:e6:11:01 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 28 BSSID 84:d4:7e:e6:22:51 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 29 BSSID 84:d4:7e:e6:11:11 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 30 BSSID 84:d4:7e:e6:11:31 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 31 BSSID 84:d4:7e:e6:22:91 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 32 BSSID 84:d4:7e:e6:17:21 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 33 BSSID 80:2a:a8:7c:87:3a SSID 'CS-AP'
tiw_sta: BSS: Add new id 34 BSSID 24:a4:3c:96:26:cc SSID 'Wifi-Tech'
BSS: last_scan_res_used=35/64 last_scan_full=1
tiw_sta: New scan results available
tiw_sta: Selecting BSS from priority group 5
tiw_sta: 0: c4:e9:84:d8:98:96 ssid='TI_AP' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-35
tiw_sta: selected based on RSN IE
tiw_sta: selected BSS c4:e9:84:d8:98:96 ssid='TI_AP'
tiw_sta: Considering connect request: reassociate: 1 selected: c4:e9:84:d8:98:96 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x853bfbf8 current_ssid=0x0
tiw_sta: Request association with c4:e9:84:d8:98:96
tiw_sta: Trying to associate with c4:e9:84:d8:98:96 (SSID='TI_AP' freq=2412 MHz)
tiw_sta: Cancelling sched scan
HOSTAPTI wilink_driver_stop_sched_scan: enter
tiw_sta: Cancelling scan request
tiw_sta: WPA: clearing own WPA/RSN IE
tiw_sta: Automatic auth_alg selection: 0x1
tiw_sta: RSN: using IEEE 802.11i/D9.0
tiw_sta: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
tiw_sta: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
tiw_sta: WPA: using GTK CCMP
tiw_sta: WPA: using PTK CCMP
tiw_sta: WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
tiw_sta: No keys have been configured - skip key clearing
tiw_sta: State: SCANNING -> ASSOCIATING
wilink_set_operstate: operstate 0->0 (DORMANT)
Limit connection to BSSID c4:e9:84:d8:98:96 freq=2412 MHz based on scan results (bssid_set=0)
HOSTAPTIW wilink_associate: enter, mode = 0 role 1 iface tiw_sta
tiw_sta: Setting authentication timeout: 10 sec 0 usec
HOSTAPTIW wilink_wireless_event_custom: event=39
tiw_sta: Event CHANNEL_LIST_CHANGED (31) received
tiw_sta: Channel list changed restart sched scan.
tiw_sta: Restarting sched scan with new parameters
tiw_sta: Cancelling sched scan
HOSTAPTI wilink_driver_stop_sched_scan: enter
ioctl[ioctl_cmd]
HOSTAPTIWERR wilink_driver_stop_sched_scan: error sending TI_PARAM_STTOP_CONNECTION_SCAN
tiw_sta: Add wildcard SSID to sched_scan
tiw_sta: add to filter ssid: TI_AP
tiw_sta: Starting sched scan: short interval 5 long_interval 30 num_short_intervals 10
HOSTAPTI wilink_driver_sched_scan: enter
HOSTAPTIW init_connection_scan_params: num channels 38
tiwdrv_connection_scan. Scan params are set! uSsidNum = 1
HOSTAPTI: Sched scan requested (ret=0) intervals: short=5000 ms long=30000 ms num_short_intervals=10
HOSTAPTIW wilink_wireless_event_custom: event=6
HOSTAPTIW wilink_wireless_event_custom: SCHED SCAN COMPLETE event
tiw_sta: Event SCHED_SCAN_STOPPED (46) received
HOSTAPTIW wilink_wireless_event_custom: event=42
tiw_sta: RX EAPOL from c4:e9:84:d8:98:96
tiw_sta: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00)
HOSTAPTIW wilink_wireless_event_custom: event=34
AssocReq IE wireless event - hexdump(len=252): 00 05 54 49 5f 41 50 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 7f 01 01 dd 07 00 50 f2 02 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
HOSTAPTIW wilink_wireless_event_custom: event=33
AssocResp IE wireless event - hexdump(len=52): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 7f 08 00 00 00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
HOSTAPTIW wilink_wireless_event_custom: event=32
Beacon IE wireless event - hexdump(len=29): 00 05 54 49 5f 41 50 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
HOSTAPTIW wilink_wireless_event_custom: event=0
HOSTAPTIW wilink_wireless_event_custom: TIW_DRV_EV_ASSOCIATED event
tiw_sta: Event ASSOCINFO (4) received
tiw_sta: Association info event
req_ies - hexdump(len=252): 00 05 54 49 5f 41 50 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 7f 01 01 dd 07 00 50 f2 02 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
resp_ies - hexdump(len=52): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 7f 08 00 00 00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
beacon_ies - hexdump(len=29): 00 05 54 49 5f 41 50 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
tiw_sta: freq=2412 MHz
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
tiw_sta: WPA: clearing AP WPA IE
tiw_sta: Event ASSOC (0) received
HOSTAPTIW wilink_get_bssid: enter
tiw_sta: State: ASSOCIATING -> ASSOCIATED
wilink_set_operstate: operstate 0->0 (DORMANT)
tiw_sta: Associated to a new BSS: BSSID=c4:e9:84:d8:98:96
tiw_sta: No keys have been configured - skip key clearing
tiw_sta: Associated with c4:e9:84:d8:98:96
tiw_sta: WPA: Association event - clear replay counter
tiw_sta: WPA: Clear old PTK
tiw_sta: Setting authentication timeout: 10 sec 0 usec
tiw_sta: Cancelling scan request
tiw_sta: cancel_sched_scan called when no sched scan
HOSTAPTIW wilink_wireless_event_custom: event=42
tiw_sta: RX EAPOL from c4:e9:84:d8:98:96
tiw_sta: Setting authentication timeout: 10 sec 0 usec
tiw_sta: IEEE 802.1X RX: version=2 type=3 length=95
tiw_sta: EAPOL-Key type=2
tiw_sta: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
tiw_sta: key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 91 a4 8f c9 01 09 ac 9c d8 41 98 46 32 40 44 df 07 fc a0 5b d0 92 99 d3 5d 2e 5f 86 19 2b 66 43
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
HOSTAPTIW wilink_get_ssid: enter
HOSTAPTIW wilink_get_bssid: enter
tiw_sta: State: ASSOCIATED -> 4WAY_HANDSHAKE
tiw_sta: WPA: RX message 1 of 4-Way Handshake from c4:e9:84:d8:98:96 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 9f 05 12 c6 2f 64 3f 8b b2 5e 2c a3 ca 6d fb 1c ca a6 01 06 6f cc b1 1b 21 5b 3f 99 1e d3 63 41
WPA: PTK derivation - A1=78:a5:04:26:95:28 A2=c4:e9:84:d8:98:96
WPA: Nonce1 - hexdump(len=32): 9f 05 12 c6 2f 64 3f 8b b2 5e 2c a3 ca 6d fb 1c ca a6 01 06 6f cc b1 1b 21 5b 3f 99 1e d3 63 41
WPA: Nonce2 - hexdump(len=32): 91 a4 8f c9 01 09 ac 9c d8 41 98 46 32 40 44 df 07 fc a0 5b d0 92 99 d3 5d 2e 5f 86 19 2b 66 43
WPA: PMK - hexdump(len=32): a3 eb ca 22 94 33 e4 65 64 af c8 66 7d 78 37 79 13 2e 08 8f de d0 40 5f d0 d3 d6 d9 54 87 e4 5e
WPA: PTK - hexdump(len=48): 0d 73 80 2c a6 16 f2 5b bb 3c f6 5a 5d e3 65 f9 7d 3b 69 3e 1a 2e 3d 54 95 fb 2c 45 21 5b a8 50 42 d8 d4 01 9f cb f1 8a fe b9 68 8f 7d 68 e7 40
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
tiw_sta: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): 0d 73 80 2c a6 16 f2 5b bb 3c f6 5a 5d e3 65 f9
WPA: Derived Key MIC - hexdump(len=16): dd 9b 49 2c 20 52 50 70 24 4f b0 1f ab 52 25 d2
HOSTAPTIW wilink_wireless_event_custom: event=42
tiw_sta: RX EAPOL from c4:e9:84:d8:98:96
tiw_sta: IEEE 802.1X RX: version=2 type=3 length=151
tiw_sta: EAPOL-Key type=2
tiw_sta: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
tiw_sta: key_length=16 key_data_length=56
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): 91 a4 8f c9 01 09 ac 9c d8 41 98 46 32 40 44 df 07 fc a0 5b d0 92 99 d3 5d 2e 5f 86 19 2b 66 43
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 6c 0d cd 6e eb 25 6b 60 04 91 d1 e6 70 2b 6e 52
RSN: encrypted key data - hexdump(len=56): 12 e9 95 c7 af b2 5c ff 65 b6 ed ba 91 38 71 36 eb 0f a1 e6 7b c9 9d 72 7f e0 98 08 7a a9 3f 53 bd fe ca bc ce d6 30 ab e7 a3 4b a2 ea 4b 92 91 02 19 7b 9e 1b 61 bb 51
WPA: decrypted EAPOL-Key key data - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 9f b1 4c 88 98 d5 49 b8 0f 41 76 35 69 79 0c 3f dd 00
tiw_sta: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
tiw_sta: WPA: RX message 3 of 4-Way Handshake from c4:e9:84:d8:98:96 (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 9f b1 4c 88 98 d5 49 b8 0f 41 76 35 69 79 0c 3f dd 00
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: GTK in EAPOL-Key - hexdump(len=24): dd 16 00 0f ac 01 01 00 9f b1 4c 88 98 d5 49 b8 0f 41 76 35 69 79 0c 3f
tiw_sta: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): 0d 73 80 2c a6 16 f2 5b bb 3c f6 5a 5d e3 65 f9
WPA: Derived Key MIC - hexdump(len=16): 19 89 1b 08 9d db 17 a1 4d 4c e2 da 4b 35 65 6a
tiw_sta: WPA: Installing PTK to the driver
HOSTAPTI wilink_set_key: enter
tiw_sta: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): 01 00 9f b1 4c 88 98 d5 49 b8 0f 41 76 35 69 79 0c 3f
WPA: Group Key - hexdump(len=16): 9f b1 4c 88 98 d5 49 b8 0f 41 76 35 69 79 0c 3f
tiw_sta: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
HOSTAPTI wilink_set_key: enter
tiw_sta: WPA: Key negotiation completed with c4:e9:84:d8:98:96 [PTK=CCMP GTK=CCMP]
tiw_sta: Cancelling authentication timeout
tiw_sta: State: GROUP_HANDSHAKE -> COMPLETED
tiw_sta: CTRL-EVENT-CONNECTED - Connection to c4:e9:84:d8:98:96 completed (auth) [id=0 id_str=]
wilink_set_operstate: operstate 0->1 (UP)
KERN_INFO: TIWLAN: 16.000000: ************ NEW CONNECTION ************
KERN_INFO: TIWLAN: 16.000000: roleSta , CONSOLE
-- BSSID = c4-e9-84-d8-98-96
KERN_INFO: TIWLAN: 16.000000: -- SSID = TI_AP
KERN_INFO: TIWLAN: 16.000000: -- BSSID = c4-e9-84-d8-98-96
KERN_INFO: TIWLAN: 16.000000: ****************************************
HOSTAPTIW wilink_wireless_event_custom: event=22
HOSTAPTIW wilink_wireless_event_custom: SCHED SCAN REPORT event
tiw_sta: Event SCAN_RESULTS (3) received
HOSTAPTI wilink_get_scan_results: enter
Received 232 bytes of scan results (1 BSSes)
tiw_sta: BSS: Start scan result update 2
BSS: last_scan_res_used=1/64 last_scan_full=1
tiw_sta: New scan results available
tiw_sta: Selecting BSS from priority group 5
tiw_sta: 0: c4:e9:84:d8:98:96 ssid='TI_AP' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-35
tiw_sta: selected based on RSN IE
tiw_sta: selected BSS c4:e9:84:d8:98:96 ssid='TI_AP'
HOSTAPTIW wilink_wireless_event_custom: event=22
HOSTAPTIW wilink_wireless_event_custom: SCHED SCAN REPORT event
tiw_sta: Event SCAN_RESULTS (3) received
HOSTAPTI wilink_get_scan_results: enter
Received 224 bytes of scan results (1 BSSes)
tiw_sta: BSS: Start scan result update 3
tiw_sta: BSS: Remove id 1 BSSID 84:d4:7e:e6:17:b0 SSID 'MGC' due to no match in scan
tiw_sta: BSS: Remove id 2 BSSID 84:d4:7e:e6:14:d0 SSID 'MGC' due to no match in scan
tiw_sta: BSS: Remove id 3 BSSID f8:d1:11:70:3a:fe SSID 'testap' due to no match in scan
tiw_sta: BSS: Remove id 4 BSSID 84:d4:7e:e6:13:10 SSID 'MGC' due to no match in scan
tiw_sta: BSS: Remove id 5 BSSID 84:d4:7e:e6:17:a0 SSID 'MGC' due to no match in scan
tiw_sta: BSS: Remove id 6 BSSID 84:d4:7e:e6:14:c0 SSID 'MGC' due to no match in scan
tiw_sta: BSS: Remove id 7 BSSID a8:e7:05:f0:5d:05 SSID 'Adnan-Zong' due to no match in scan
tiw_sta: BSS: Remove id 8 BSSID 96:53:30:41:30:41 SSID 'DIRECT-41-HP M477 LaserJet' due to no match in scan
tiw_sta: BSS: Remove id 9 BSSID 84:d4:7e:e6:13:00 SSID 'MGC' due to no match in scan
tiw_sta: BSS: Remove id 10 BSSID 84:d4:7e:e6:11:00 SSID 'MGC' due to no match in scan
tiw_sta: BSS: Remove id 11 BSSID 84:d4:7e:e6:12:c0 SSID 'MGC' due to no match in scan
tiw_sta: BSS: Remove id 12 BSSID 84:d4:7e:e6:22:50 SSID 'MGC' due to no match in scan
tiw_sta: BSS: Remove id 13 BSSID 84:d4:7e:e6:11:10 SSID 'MGC' due to no match in scan
tiw_sta: BSS: Remove id 14 BSSID 28:8a:1c:29:46:82 SSID 'NCWL_E_Conf_2' due to no match in scan
tiw_sta: BSS: Remove id 15 BSSID 84:d4:7e:e6:17:20 SSID 'MGC' due to no match in scan
tiw_sta: BSS: Remove id 16 BSSID 84:d4:7e:e6:22:90 SSID 'MGC' due to no match in scan
tiw_sta: BSS: Remove id 17 BSSID 70:4f:57:5f:1c:74 SSID 'MUZAFFAR-LAW' due to no match in scan
tiw_sta: BSS: Remove id 18 BSSID 6c:b7:49:27:81:ea SSID 'HUAWEI-81EA' due to no match in scan
tiw_sta: BSS: Remove id 19 BSSID 84:d4:7e:e6:17:b1 SSID 'MentorGuest' due to no match in scan
tiw_sta: BSS: Remove id 20 BSSID 84:d4:7e:e6:14:d1 SSID 'MentorGuest' due to no match in scan
tiw_sta: BSS: Remove id 21 BSSID 84:d4:7e:e6:13:11 SSID 'MentorGuest' due to no match in scan
tiw_sta: BSS: Remove id 22 BSSID 84:d4:7e:e6:17:a1 SSID 'MentorGuest' due to no match in scan
tiw_sta: BSS: Remove id 23 BSSID 84:d4:7e:e6:14:c1 SSID 'MentorGuest' due to no match in scan
tiw_sta: BSS: Remove id 24 BSSID 84:d4:7e:e6:13:01 SSID 'MentorGuest' due to no match in scan
tiw_sta: BSS: Remove id 25 BSSID 84:d4:7e:e6:11:21 SSID 'MentorGuest' due to no match in scan
tiw_sta: BSS: Remove id 26 BSSID 84:d4:7e:e6:12:c1 SSID 'MentorGuest' due to no match in scan
tiw_sta: BSS: Remove id 27 BSSID 84:d4:7e:e6:11:01 SSID 'MentorGuest' due to no match in scan
tiw_sta: BSS: Remove id 28 BSSID 84:d4:7e:e6:22:51 SSID 'MentorGuest' due to no match in scan
tiw_sta: BSS: Remove id 29 BSSID 84:d4:7e:e6:11:11 SSID 'MentorGuest' due to no match in scan
tiw_sta: BSS: Remove id 30 BSSID 84:d4:7e:e6:11:31 SSID 'MentorGuest' due to no match in scan
tiw_sta: BSS: Remove id 31 BSSID 84:d4:7e:e6:22:91 SSID 'MentorGuest' due to no match in scan
tiw_sta: BSS: Remove id 32 BSSID 84:d4:7e:e6:17:21 SSID 'MentorGuest' due to no match in scan
tiw_sta: BSS: Remove id 33 BSSID 80:2a:a8:7c:87:3a SSID 'CS-AP' due to no match in scan
tiw_sta: BSS: Remove id 34 BSSID 24:a4:3c:96:26:cc SSID 'Wifi-Tech' due to no match in scan
BSS: last_scan_res_used=1/64 last_scan_full=1
tiw_sta: New scan results available
tiw_sta: Selecting BSS from priority group 5
tiw_sta: 0: c4:e9:84:d8:98:96 ssid='TI_AP' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-35
tiw_sta: selected based on RSN IE
tiw_sta: selected BSS c4:e9:84:d8:98:96 ssid='TI_AP'
HOSTAPTIW wilink_wireless_event_custom: event=22
HOSTAPTIW wilink_wireless_event_custom: SCHED SCAN REPORT event
tiw_sta: Event SCAN_RESULTS (3) received
HOSTAPTI wilink_get_scan_results: enter
Received 224 bytes of scan results (1 BSSes)
tiw_sta: BSS: Start scan result update 4
BSS: last_scan_res_used=1/64 last_scan_full=1
tiw_sta: New scan results available
tiw_sta: Selecting BSS from priority group 5
tiw_sta: 0: c4:e9:84:d8:98:96 ssid='TI_AP' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-35
tiw_sta: selected based on RSN IE
tiw_sta: selected BSS c4:e9:84:d8:98:96 ssid='TI_AP'
HOSTAPTIW wilink_wireless_event_custom: event=22
HOSTAPTIW wilink_wireless_event_custom: SCHED SCAN REPORT event
tiw_sta: Event SCAN_RESULTS (3) received
HOSTAPTI wilink_get_scan_results: enter
Received 224 bytes of scan results (1 BSSes)
tiw_sta: BSS: Start scan result update 5
BSS: last_scan_res_used=1/64 last_scan_full=1
tiw_sta: New scan results available
tiw_sta: Selecting BSS from priority group 5
tiw_sta: 0: c4:e9:84:d8:98:96 ssid='TI_AP' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-35
tiw_sta: selected based on RSN IE
tiw_sta: selected BSS c4:e9:84:d8:98:96 ssid='TI_AP'
HOSTAPTIW wilink_wireless_event_custom: event=22
HOSTAPTIW wilink_wireless_event_custom: SCHED SCAN REPORT event
tiw_sta: Event SCAN_RESULTS (3) received
HOSTAPTI wilink_get_scan_results: enter
Received 224 bytes of scan results (1 BSSes)
tiw_sta: BSS: Start scan result update 6
BSS: last_scan_res_used=1/64 last_scan_full=1
tiw_sta: New scan results available
tiw_sta: Selecting BSS from priority group 5
tiw_sta: 0: c4:e9:84:d8:98:96 ssid='TI_AP' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-35
tiw_sta: selected based on RSN IE
tiw_sta: selected BSS c4:e9:84:d8:98:96 ssid='TI_AP'
HOSTAPTIW wilink_wireless_event_custom: event=22
HOSTAPTIW wilink_wireless_event_custom: SCHED SCAN REPORT event
tiw_sta: Event SCAN_RESULTS (3) received
HOSTAPTI wilink_get_scan_results: enter
Received 224 bytes of scan results (1 BSSes)
tiw_sta: BSS: Start scan result update 7
BSS: last_scan_res_used=1/64 last_scan_full=1
tiw_sta: New scan results available
tiw_sta: Selecting BSS from priority group 5
tiw_sta: 0: c4:e9:84:d8:98:96 ssid='TI_AP' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-36
tiw_sta: selected based on RSN IE
tiw_sta: selected BSS c4:e9:84:d8:98:96 ssid='TI_AP'
HOSTAPTIW wilink_wireless_event_custom: event=22
HOSTAPTIW wilink_wireless_event_custom: SCHED SCAN REPORT event
tiw_sta: Event SCAN_RESULTS (3) received
HOSTAPTI wilink_get_scan_results: enter
Received 224 bytes of scan results (1 BSSes)
tiw_sta: BSS: Start scan result update 8
BSS: last_scan_res_used=1/64 last_scan_full=1
tiw_sta: New scan results available
tiw_sta: Selecting BSS from priority group 5
tiw_sta: 0: c4:e9:84:d8:98:96 ssid='TI_AP' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-35
tiw_sta: selected based on RSN IE
tiw_sta: selected BSS c4:e9:84:d8:98:96 ssid='TI_AP'
HOSTAPTIW wilink_wireless_event_custom: event=22
HOSTAPTIW wilink_wireless_event_custom: SCHED SCAN REPORT event
tiw_sta: Event SCAN_RESULTS (3) received
HOSTAPTI wilink_get_scan_results: enter
Received 224 bytes of scan results (1 BSSes)
tiw_sta: BSS: Start scan result update 9
BSS: last_scan_res_used=1/64 last_scan_full=1
tiw_sta: New scan results available
tiw_sta: Selecting BSS from priority group 5
tiw_sta: 0: c4:e9:84:d8:98:96 ssid='TI_AP' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-36
tiw_sta: selected based on RSN IE
tiw_sta: selected BSS c4:e9:84:d8:98:96 ssid='TI_AP'
HOSTAPTIW wilink_wireless_event_custom: event=22
HOSTAPTIW wilink_wireless_event_custom: SCHED SCAN REPORT event
tiw_sta: Event SCAN_RESULTS (3) received
HOSTAPTI wilink_get_scan_results: enter
Received 224 bytes of scan results (1 BSSes)
tiw_sta: BSS: Start scan result update 10
BSS: last_scan_res_used=1/64 last_scan_full=1
tiw_sta: New scan results available
tiw_sta: Selecting BSS from priority group 5
tiw_sta: 0: c4:e9:84:d8:98:96 ssid='TI_AP' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-35
tiw_sta: selected based on RSN IE
tiw_sta: selected BSS c4:e9:84:d8:98:96 ssid='TI_AP'
HOSTAPTIW wilink_wireless_event_custom: event=22
HOSTAPTIW wilink_wireless_event_custom: SCHED SCAN REPORT event
tiw_sta: Event SCAN_RESULTS (3) received
HOSTAPTI wilink_get_scan_results: enter
Received 224 bytes of scan results (1 BSSes)
tiw_sta: BSS: Start scan result update 11
BSS: last_scan_res_used=1/64 last_scan_full=1
tiw_sta: New scan results available
tiw_sta: Selecting BSS from priority group 5
tiw_sta: 0: c4:e9:84:d8:98:96 ssid='TI_AP' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-36
tiw_sta: selected based on RSN IE
tiw_sta: selected BSS c4:e9:84:d8:98:96 ssid='TI_AP'
HOSTAPTIW wilink_wireless_event_custom: event=22
HOSTAPTIW wilink_wireless_event_custom: SCHED SCAN REPORT event
tiw_sta: Event SCAN_RESULTS (3) received
HOSTAPTI wilink_get_scan_results: enter
Received 224 bytes of scan results (1 BSSes)
tiw_sta: BSS: Start scan result update 12
BSS: last_scan_res_used=1/64 last_scan_full=1
tiw_sta: New scan results available
tiw_sta: Selecting BSS from priority group 5
tiw_sta: 0: c4:e9:84:d8:98:96 ssid='TI_AP' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-39
tiw_sta: selected based on RSN IE
tiw_sta: selected BSS c4:e9:84:d8:98:96 ssid='TI_AP'
HOSTAPTIW wilink_wireless_event_custom: event=22
HOSTAPTIW wilink_wireless_event_custom: SCHED SCAN REPORT event
tiw_sta: Event SCAN_RESULTS (3) received
HOSTAPTI wilink_get_scan_results: enter
Received 232 bytes of scan results (1 BSSes)
tiw_sta: BSS: Start scan result update 13
BSS: last_scan_res_used=1/64 last_scan_full=1
tiw_sta: New scan results available
tiw_sta: Selecting BSS from priority group 5
tiw_sta: 0: c4:e9:84:d8:98:96 ssid='TI_AP' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-39
tiw_sta: selected based on RSN IE
tiw_sta: selected BSS c4:e9:84:d8:98:96 ssid='TI_AP'
HOSTAPTIW wilink_wireless_event_custom: event=22
HOSTAPTIW wilink_wireless_event_custom: SCHED SCAN REPORT event
tiw_sta: Event SCAN_RESULTS (3) received
HOSTAPTI wilink_get_scan_results: enter
Received 224 bytes of scan results (1 BSSes)
tiw_sta: BSS: Start scan result update 14
BSS: last_scan_res_used=1/64 last_scan_full=1
tiw_sta: New scan results available
tiw_sta: Selecting BSS from priority group 5
tiw_sta: 0: c4:e9:84:d8:98:96 ssid='TI_AP' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-39
tiw_sta: selected based on RSN IE
tiw_sta: selected BSS c4:e9:84:d8:98:96 ssid='TI_AP'
HOSTAPTIW wilink_wireless_event_custom: event=22
HOSTAPTIW wilink_wireless_event_custom: SCHED SCAN REPORT event
tiw_sta: Event SCAN_RESULTS (3) received
HOSTAPTI wilink_get_scan_results: enter
Received 224 bytes of scan results (1 BSSes)
tiw_sta: BSS: Start scan result update 15
BSS: last_scan_res_used=1/64 last_scan_full=1
tiw_sta: New scan results available
tiw_sta: Selecting BSS from priority group 5
tiw_sta: 0: c4:e9:84:d8:98:96 ssid='TI_AP' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-38
tiw_sta: selected based on RSN IE
tiw_sta: selected BSS c4:e9:84:d8:98:96 ssid='TI_AP'
HOSTAPTIW wilink_wireless_event_custom: event=22
krackattack: sudo ./krack-test-client.py --replay-broadcast [17:06:01] Note: disable Wi-Fi in network manager & disable hardware encryption. Both may interfere with this script. [17:06:02] Starting hostapd ... Configuration file: /home/mentor/krack3/krackattacks-scripts/krackattack/hostapd.conf Using interface wlan0 with hwaddr c4:e9:84:d8:98:96 and ssid "TI_AP" wlan0: interface state UNINITIALIZED->ENABLED wlan0: AP-ENABLED [17:06:03] Ready. Connect to this Access Point to start the tests. Make sure the client requests an IP using DHCP! [17:06:04] Reset PN for GTK [17:06:06] Reset PN for GTK [17:06:08] Reset PN for GTK [17:06:10] Reset PN for GTK [17:06:12] Reset PN for GTK [17:06:14] Reset PN for GTK wlan0: STA 3c:a9:f4:42:82:88 IEEE 802.11: authenticated wlan0: STA 3c:a9:f4:42:82:88 IEEE 802.11: associated (aid 1) wlan0: AP-STA-CONNECTED 3c:a9:f4:42:82:88 wlan0: STA 3c:a9:f4:42:82:88 RADIUS: starting accounting session D9C203F7D8AD631D [17:06:16] 3c:a9:f4:42:82:88: 4-way handshake completed (RSN) [17:06:16] 3c:a9:f4:42:82:88: DHCP reply 192.168.100.2 to 3c:a9:f4:42:82:88 [17:06:16] Reset PN for GTK [17:06:16] 3c:a9:f4:42:82:88: client has IP address -> now sending replayed broadcast ARP packets [17:06:16] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 0 ARPs this interval) [17:06:18] Reset PN for GTK [17:06:18] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval) [17:06:19] 3c:a9:f4:42:82:88: DHCP reply 192.168.100.2 to 3c:a9:f4:42:82:88 [17:06:20] Reset PN for GTK [17:06:20] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval) [17:06:22] Reset PN for GTK [17:06:22] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval) wlan0: STA 78:a5:04:26:95:28 IEEE 802.11: authenticated wlan0: STA 78:a5:04:26:95:28 IEEE 802.11: associated (aid 2) [17:06:24] Reset PN for GTK [17:06:24] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval) wlan0: AP-STA-CONNECTED 78:a5:04:26:95:28 wlan0: STA 78:a5:04:26:95:28 RADIUS: starting accounting session 0426A00316971677 [17:06:24] 78:a5:04:26:95:28: 4-way handshake completed (RSN) [17:06:25] 78:a5:04:26:95:28: DHCP reply 192.168.100.3 to 78:a5:04:26:95:28 [17:06:25] 78:a5:04:26:95:28: DHCP reply 192.168.100.3 to 78:a5:04:26:95:28 [17:06:26] Reset PN for GTK [17:06:26] 78:a5:04:26:95:28: client has IP address -> now sending replayed broadcast ARP packets [17:06:26] 78:a5:04:26:95:28: sending broadcast ARP to 192.168.100.3 from 192.168.100.1 (sent 0 ARPs this interval) [17:06:26] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval) [17:06:28] 3c:a9:f4:42:82:88: DHCP reply 192.168.100.2 to 3c:a9:f4:42:82:88 [17:06:28] Reset PN for GTK [17:06:28] 78:a5:04:26:95:28: sending broadcast ARP to 192.168.100.3 from 192.168.100.1 (sent 1 ARPs this interval) [17:06:28] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval) [17:06:30] Reset PN for GTK [17:06:30] 78:a5:04:26:95:28: sending broadcast ARP to 192.168.100.3 from 192.168.100.1 (sent 2 ARPs this interval) [17:06:30] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval) [17:06:32] Reset PN for GTK [17:06:32] 78:a5:04:26:95:28: sending broadcast ARP to 192.168.100.3 from 192.168.100.1 (sent 3 ARPs this interval) [17:06:32] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval) [17:06:34] Reset PN for GTK [17:06:34] 78:a5:04:26:95:28: sending broadcast ARP to 192.168.100.3 from 192.168.100.1 (sent 4 ARPs this interval) [17:06:34] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval) [17:06:37] Reset PN for GTK [17:06:37] 78:a5:04:26:95:28: sending broadcast ARP to 192.168.100.3 from 192.168.100.1 (sent 1 ARPs this interval) [17:06:37] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval) [17:06:39] Reset PN for GTK [17:06:39] 78:a5:04:26:95:28: sending broadcast ARP to 192.168.100.3 from 192.168.100.1 (sent 2 ARPs this interval) [17:06:39] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval) [17:06:41] Reset PN for GTK [17:06:41] 78:a5:04:26:95:28: sending broadcast ARP to 192.168.100.3 from 192.168.100.1 (sent 3 ARPs this interval) [17:06:41] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval) [17:06:43] Reset PN for GTK [17:06:43] 78:a5:04:26:95:28: sending broadcast ARP to 192.168.100.3 from 192.168.100.1 (sent 4 ARPs this interval) [17:06:43] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval) [17:06:44] 3c:a9:f4:42:82:88: DHCP reply 192.168.100.2 to 3c:a9:f4:42:82:88 [17:06:45] Reset PN for GTK [17:06:45] 78:a5:04:26:95:28: sending broadcast ARP to 192.168.100.3 from 192.168.100.1 (sent 1 ARPs this interval) [17:06:45] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval) [17:06:45] 78:a5:04:26:95:28: Client accepts replayed broadcast frames (this is bad). [17:06:45] Fix this before testing for group key (re)installations! [17:06:47] Reset PN for GTK [17:06:47] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval) [17:06:49] Reset PN for GTK [17:06:49] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval) [17:06:49] 3c:a9:f4:42:82:88: DHCP reply 192.168.100.2 to 3c:a9:f4:42:82:88 [17:06:51] Reset PN for GTK [17:06:51] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval) [17:06:53] Reset PN for GTK [17:06:53] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval) [17:06:55] Reset PN for GTK [17:06:55] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval) [17:06:57] Reset PN for GTK [17:06:57] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval) [17:06:58] 3c:a9:f4:42:82:88: DHCP reply 192.168.100.2 to 3c:a9:f4:42:82:88 [17:06:59] Reset PN for GTK [17:06:59] 3c:a9:f4:42:82:88: Client DOESN'T accept replayed broadcast frames (this is good) [17:06:59] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval) [17:07:01] Reset PN for GTK [17:07:01] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval) [17:07:03] Reset PN for GTK [17:07:03] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval) [17:07:05] Reset PN for GTK [17:07:05] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval) [17:07:07] Reset PN for GTK [17:07:07] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval) [17:07:09] Reset PN for GTK [17:07:09] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval) [17:07:11] Reset PN for GTK [17:07:11] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval) [17:07:13] Reset PN for GTK [17:07:13] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval) [17:07:15] Reset PN for GTK [17:07:15] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval) [17:07:17] Reset PN for GTK [17:07:17] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval) [17:07:19] Reset PN for GTK [17:07:19] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval) [17:07:19] 3c:a9:f4:42:82:88: DHCP reply 192.168.100.2 to 3c:a9:f4:42:82:88 [17:07:21] Reset PN for GTK [17:07:21] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval) [17:07:22] 3c:a9:f4:42:82:88: DHCP reply 192.168.100.2 to 3c:a9:f4:42:82:88 [17:07:23] Reset PN for GTK [17:07:23] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval) [17:07:25] Reset PN for GTK [17:07:25] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval) [17:07:27] Reset PN for GTK [17:07:27] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval) [17:07:29] Reset PN for GTK [17:07:30] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval) [17:07:32] Reset PN for GTK [17:07:32] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval) [17:07:34] Reset PN for GTK [17:07:34] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval) [17:07:36] Reset PN for GTK [17:07:36] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval) [17:07:38] Reset PN for GTK [17:07:38] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval) [17:07:40] Reset PN for GTK [17:07:40] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval) [17:07:42] Reset PN for GTK [17:07:42] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval) [17:07:44] Reset PN for GTK [17:07:44] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval) [17:07:46] Reset PN for GTK [17:07:46] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval) [17:07:48] Reset PN for GTK [17:07:48] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval) [17:07:50] Reset PN for GTK [17:07:50] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval) [17:07:52] Reset PN for GTK [17:07:52] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval) [17:07:54] Reset PN for GTK [17:07:54] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval) [17:07:56] Reset PN for GTK [17:07:56] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval) [17:07:58] Reset PN for GTK [17:07:58] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval) [17:08:00] Reset PN for GTK [17:08:00] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval) [17:08:02] Reset PN for GTK [17:08:02] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval) [17:08:04] Reset PN for GTK [17:08:04] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval) [17:08:06] Reset PN for GTK [17:08:06] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval) [17:08:08] Reset PN for GTK [17:08:08] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval) [17:08:10] Reset PN for GTK [17:08:10] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval) [17:08:13] Reset PN for GTK [17:08:13] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval) [17:08:15] Reset PN for GTK [17:08:15] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval) [17:08:17] Reset PN for GTK [17:08:17] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval) [17:08:19] Reset PN for GTK [17:08:19] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval) [17:08:21] Reset PN for GTK [17:08:21] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval) [17:08:23] Reset PN for GTK [17:08:23] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval) [17:08:25] Reset PN for GTK [17:08:25] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval) [17:08:27] Reset PN for GTK [17:08:27] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval) [17:08:29] Reset PN for GTK [17:08:29] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval) [17:08:31] Reset PN for GTK [17:08:31] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval) [17:08:33] Reset PN for GTK [17:08:33] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval) [17:08:35] Reset PN for GTK [17:08:35] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval) [17:08:37] Reset PN for GTK [17:08:37] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval) [17:08:39] Reset PN for GTK [17:08:39] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval) [17:08:41] Reset PN for GTK [17:08:41] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval) [17:08:43] Reset PN for GTK [17:08:43] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval) [17:08:45] Reset PN for GTK [17:08:45] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval) [17:08:47] Reset PN for GTK [17:08:47] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval) [17:08:49] Reset PN for GTK [17:08:49] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval) [17:08:51] Reset PN for GTK [17:08:51] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval) [17:08:53] Reset PN for GTK [17:08:53] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval) [17:08:55] Reset PN for GTK [17:08:55] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval) [17:08:57] Reset PN for GTK [17:08:57] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval) [17:09:00] Reset PN for GTK [17:09:00] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval) [17:09:02] Reset PN for GTK [17:09:02] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval) [17:09:04] Reset PN for GTK [17:09:04] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval) [17:09:06] Reset PN for GTK [17:09:06] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval) ^Cwlan0: interface state ENABLED->DISABLED wlan0: AP-STA-DISCONNECTED 78:a5:04:26:95:28 wlan0: AP-STA-DISCONNECTED 3c:a9:f4:42:82:88 Traceback (most recent call last): File "./krack-test-client.py", line 609, in <module> wlan0: AP-DISABLED wlan0: CTRL-EVENT-TERMINATING attack.run(options=options) File "./krack-test-client.py", line 469, in run nl80211: deinit ifname=wlan0 disabled_11b_rates=0 sel = select.select([self.sock_mon, self.sock_eth], [], [], 1) KeyboardInterrupt [17:09:07] Closing hostapd and cleaning up ... krackattack:
krackattack: ./krack-test-client.py --replay-broadcast
[16:05:50] Note: disable Wi-Fi in network manager & disable hardware encryption. Both may interfere with this script.
command failed: Operation not permitted (-1)
Traceback (most recent call last):
File "./krack-test-client.py", line 609, in <module>
attack.run(options=options)
File "./krack-test-client.py", line 424, in run
self.configure_interfaces()
File "./krack-test-client.py", line 414, in configure_interfaces
subprocess.check_output(["iw", self.nic_iface, "interface", "add", self.nic_mon, "type", "monitor"])
File "/usr/lib/python2.7/subprocess.py", line 574, in check_output
raise CalledProcessError(retcode, cmd, output=output)
subprocess.CalledProcessError: Command '['iw', 'wlan0', 'interface', 'add', 'wlan0mon', 'type', 'monitor']' returned non-zero exit status 255
[16:05:50] Closing hostapd and cleaning up ...
krackattack: sudo ./krack-test-client.py --replay-broadcast
[16:06:17] Note: disable Wi-Fi in network manager & disable hardware encryption. Both may interfere with this script.
[16:06:18] Starting hostapd ...
Configuration file: /home/mentor/krack3/krackattacks-scripts/krackattack/hostapd.conf
Using interface wlan0 with hwaddr c4:e9:84:d8:98:96 and ssid "TI_AP"
wlan0: interface state UNINITIALIZED->ENABLED
wlan0: AP-ENABLED
[16:06:19] Ready. Connect to this Access Point to start the tests. Make sure the client requests an IP using DHCP!
[16:06:20] Reset PN for GTK
[16:06:22] Reset PN for GTK
[16:06:24] Reset PN for GTK
[16:06:26] Reset PN for GTK
[16:06:28] Reset PN for GTK
[16:06:30] Reset PN for GTK
[16:06:32] Reset PN for GTK
[16:06:34] Reset PN for GTK
[16:06:36] Reset PN for GTK
[16:06:38] Reset PN for GTK
[16:06:40] Reset PN for GTK
[16:06:43] Reset PN for GTK
[16:06:45] Reset PN for GTK
[16:06:47] Reset PN for GTK
[16:06:49] Reset PN for GTK
wlan0: STA 3c:a9:f4:42:82:88 IEEE 802.11: authenticated
wlan0: STA 3c:a9:f4:42:82:88 IEEE 802.11: associated (aid 1)
wlan0: AP-STA-CONNECTED 3c:a9:f4:42:82:88
wlan0: STA 3c:a9:f4:42:82:88 RADIUS: starting accounting session E76399EA25E49901
[16:06:50] 3c:a9:f4:42:82:88: 4-way handshake completed (RSN)
[16:06:50] 3c:a9:f4:42:82:88: DHCP reply 192.168.100.2 to 3c:a9:f4:42:82:88
[16:06:51] Reset PN for GTK
[16:06:51] 3c:a9:f4:42:82:88: client has IP address -> now sending replayed broadcast ARP packets
[16:06:51] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 0 ARPs this interval)
[16:06:53] Reset PN for GTK
[16:06:53] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
wlan0: STA 78:a5:04:26:95:28 IEEE 802.11: authenticated
wlan0: STA 78:a5:04:26:95:28 IEEE 802.11: associated (aid 2)
wlan0: AP-STA-CONNECTED 78:a5:04:26:95:28
wlan0: STA 78:a5:04:26:95:28 RADIUS: starting accounting session 6DB97744C6F50248
[16:06:54] 78:a5:04:26:95:28: 4-way handshake completed (RSN)
[16:06:54] 78:a5:04:26:95:28: DHCP reply 192.168.100.3 to 78:a5:04:26:95:28
[16:06:54] 78:a5:04:26:95:28: DHCP reply 192.168.100.3 to 78:a5:04:26:95:28
[16:06:55] Reset PN for GTK
[16:06:55] 78:a5:04:26:95:28: client has IP address -> now sending replayed broadcast ARP packets
[16:06:55] 78:a5:04:26:95:28: sending broadcast ARP to 192.168.100.3 from 192.168.100.1 (sent 0 ARPs this interval)
[16:06:55] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:06:56] 3c:a9:f4:42:82:88: DHCP reply 192.168.100.2 to 3c:a9:f4:42:82:88
[16:06:57] Reset PN for GTK
[16:06:57] 78:a5:04:26:95:28: sending broadcast ARP to 192.168.100.3 from 192.168.100.1 (sent 1 ARPs this interval)
[16:06:57] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:06:59] Reset PN for GTK
[16:06:59] 78:a5:04:26:95:28: sending broadcast ARP to 192.168.100.3 from 192.168.100.1 (sent 2 ARPs this interval)
[16:06:59] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:07:01] Reset PN for GTK
[16:07:01] 78:a5:04:26:95:28: sending broadcast ARP to 192.168.100.3 from 192.168.100.1 (sent 3 ARPs this interval)
[16:07:01] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:07:03] Reset PN for GTK
[16:07:03] 78:a5:04:26:95:28: sending broadcast ARP to 192.168.100.3 from 192.168.100.1 (sent 4 ARPs this interval)
[16:07:03] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:07:04] 3c:a9:f4:42:82:88: DHCP reply 192.168.100.2 to 3c:a9:f4:42:82:88
[16:07:05] Reset PN for GTK
[16:07:05] 78:a5:04:26:95:28: sending broadcast ARP to 192.168.100.3 from 192.168.100.1 (sent 1 ARPs this interval)
[16:07:05] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:07:07] Reset PN for GTK
[16:07:07] 78:a5:04:26:95:28: sending broadcast ARP to 192.168.100.3 from 192.168.100.1 (sent 2 ARPs this interval)
[16:07:07] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:07:07] 78:a5:04:26:95:28: Client accepts replayed broadcast frames (this is bad).
[16:07:07] Fix this before testing for group key (re)installations!
[16:07:09] Reset PN for GTK
[16:07:09] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:07:11] Reset PN for GTK
[16:07:11] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:07:13] Reset PN for GTK
[16:07:13] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:07:15] Reset PN for GTK
[16:07:15] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:07:17] Reset PN for GTK
[16:07:17] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:07:19] Reset PN for GTK
[16:07:19] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:07:20] 3c:a9:f4:42:82:88: DHCP reply 192.168.100.2 to 3c:a9:f4:42:82:88
[16:07:21] Reset PN for GTK
[16:07:21] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:07:23] Reset PN for GTK
[16:07:23] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:07:23] 3c:a9:f4:42:82:88: DHCP reply 192.168.100.2 to 3c:a9:f4:42:82:88
[16:07:25] Reset PN for GTK
[16:07:25] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:07:27] Reset PN for GTK
[16:07:27] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:07:29] Reset PN for GTK
[16:07:29] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:07:30] 3c:a9:f4:42:82:88: DHCP reply 192.168.100.2 to 3c:a9:f4:42:82:88
[16:07:31] Reset PN for GTK
[16:07:31] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:07:33] Reset PN for GTK
[16:07:33] 3c:a9:f4:42:82:88: Client DOESN'T accept replayed broadcast frames (this is good)
[16:07:33] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:07:36] Reset PN for GTK
[16:07:36] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:07:38] Reset PN for GTK
[16:07:38] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:07:40] Reset PN for GTK
[16:07:40] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:07:42] Reset PN for GTK
[16:07:42] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:07:44] Reset PN for GTK
[16:07:44] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:07:46] Reset PN for GTK
[16:07:46] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:07:48] Reset PN for GTK
[16:07:48] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:07:50] Reset PN for GTK
[16:07:50] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:07:52] Reset PN for GTK
[16:07:52] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:07:54] Reset PN for GTK
[16:07:54] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:07:56] Reset PN for GTK
[16:07:56] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:07:57] 3c:a9:f4:42:82:88: DHCP reply 192.168.100.2 to 3c:a9:f4:42:82:88
[16:07:57] 3c:a9:f4:42:82:88: DHCP reply 192.168.100.2 to 3c:a9:f4:42:82:88
[16:07:58] Reset PN for GTK
[16:07:58] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:08:00] 3c:a9:f4:42:82:88: DHCP reply 192.168.100.2 to 3c:a9:f4:42:82:88
[16:08:00] Reset PN for GTK
[16:08:00] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:08:02] Reset PN for GTK
[16:08:02] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:08:04] 3c:a9:f4:42:82:88: DHCP reply 192.168.100.2 to 3c:a9:f4:42:82:88
[16:08:04] Reset PN for GTK
[16:08:04] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:08:06] Reset PN for GTK
[16:08:06] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:08:08] Reset PN for GTK
[16:08:08] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:08:10] Reset PN for GTK
[16:08:10] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:08:12] Reset PN for GTK
[16:08:12] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:08:14] Reset PN for GTK
[16:08:14] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:08:16] Reset PN for GTK
[16:08:16] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:08:18] Reset PN for GTK
[16:08:18] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:08:20] Reset PN for GTK
[16:08:20] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:08:22] Reset PN for GTK
[16:08:22] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:08:24] Reset PN for GTK
[16:08:24] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:08:26] Reset PN for GTK
[16:08:26] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:08:28] Reset PN for GTK
[16:08:28] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:08:30] Reset PN for GTK
[16:08:30] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:08:32] Reset PN for GTK
[16:08:32] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:08:34] Reset PN for GTK
[16:08:34] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:08:36] Reset PN for GTK
[16:08:36] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:08:39] Reset PN for GTK
[16:08:39] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:08:41] Reset PN for GTK
[16:08:41] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:08:43] Reset PN for GTK
[16:08:43] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:08:45] Reset PN for GTK
[16:08:45] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:08:47] Reset PN for GTK
[16:08:47] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:08:49] Reset PN for GTK
[16:08:49] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:08:51] Reset PN for GTK
[16:08:51] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:08:53] Reset PN for GTK
[16:08:53] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:08:55] Reset PN for GTK
[16:08:55] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:08:57] Reset PN for GTK
[16:08:57] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:08:59] Reset PN for GTK
[16:08:59] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:09:01] Reset PN for GTK
[16:09:01] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:09:03] Reset PN for GTK
[16:09:03] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:09:05] Reset PN for GTK
[16:09:05] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:09:07] Reset PN for GTK
[16:09:07] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:09:09] Reset PN for GTK
[16:09:09] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:09:11] Reset PN for GTK
[16:09:11] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:09:13] Reset PN for GTK
[16:09:13] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:09:15] Reset PN for GTK
[16:09:15] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:09:17] Reset PN for GTK
[16:09:17] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:09:19] Reset PN for GTK
[16:09:19] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:09:21] Reset PN for GTK
[16:09:21] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:09:23] Reset PN for GTK
[16:09:23] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:09:25] Reset PN for GTK
[16:09:25] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:09:27] Reset PN for GTK
[16:09:27] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:09:29] Reset PN for GTK
[16:09:29] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:09:31] Reset PN for GTK
[16:09:31] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:09:33] Reset PN for GTK
[16:09:33] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:09:35] Reset PN for GTK
[16:09:35] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:09:37] Reset PN for GTK
[16:09:37] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:09:39] Reset PN for GTK
[16:09:39] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:09:42] Reset PN for GTK
[16:09:42] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:09:44] Reset PN for GTK
[16:09:44] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:09:46] Reset PN for GTK
[16:09:46] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:09:48] Reset PN for GTK
[16:09:48] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:09:50] Reset PN for GTK
[16:09:50] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:09:52] Reset PN for GTK
[16:09:52] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:09:54] Reset PN for GTK
[16:09:54] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:09:56] Reset PN for GTK
[16:09:56] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:09:58] Reset PN for GTK
[16:09:58] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:10:00] Reset PN for GTK
[16:10:00] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:10:02] Reset PN for GTK
[16:10:02] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:10:04] Reset PN for GTK
[16:10:04] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:10:06] Reset PN for GTK
[16:10:06] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:10:08] Reset PN for GTK
[16:10:08] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:10:10] Reset PN for GTK
[16:10:10] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:10:12] Reset PN for GTK
[16:10:12] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:10:14] Reset PN for GTK
[16:10:14] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:10:16] Reset PN for GTK
[16:10:16] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:10:18] Reset PN for GTK
[16:10:18] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:10:20] Reset PN for GTK
[16:10:20] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:10:22] Reset PN for GTK
[16:10:22] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:10:24] Reset PN for GTK
[16:10:24] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:10:26] Reset PN for GTK
[16:10:26] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:10:28] Reset PN for GTK
[16:10:28] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:10:29] 3c:a9:f4:42:82:88: DHCP reply 192.168.100.2 to 3c:a9:f4:42:82:88
[16:10:30] Reset PN for GTK
[16:10:30] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:10:32] 3c:a9:f4:42:82:88: DHCP reply 192.168.100.2 to 3c:a9:f4:42:82:88
[16:10:32] Reset PN for GTK
[16:10:32] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:10:34] Reset PN for GTK
[16:10:34] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:10:36] Reset PN for GTK
[16:10:36] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:10:38] Reset PN for GTK
[16:10:38] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:10:40] Reset PN for GTK
[16:10:40] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:10:42] Reset PN for GTK
[16:10:42] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:10:44] Reset PN for GTK
[16:10:44] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:10:46] Reset PN for GTK
[16:10:46] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:10:48] Reset PN for GTK
[16:10:48] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:10:51] Reset PN for GTK
[16:10:51] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:10:53] Reset PN for GTK
[16:10:53] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:10:55] Reset PN for GTK
[16:10:55] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:10:57] Reset PN for GTK
[16:10:57] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:10:59] Reset PN for GTK
[16:10:59] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
[16:11:01] Reset PN for GTK
[16:11:01] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 3 ARPs this interval)
[16:11:03] Reset PN for GTK
[16:11:03] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 4 ARPs this interval)
[16:11:05] Reset PN for GTK
[16:11:05] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 1 ARPs this interval)
[16:11:07] Reset PN for GTK
[16:11:07] 3c:a9:f4:42:82:88: sending broadcast ARP to 192.168.100.2 from 192.168.100.1 (sent 2 ARPs this interval)
^Cwlan0: interface state ENABLED->DISABLED
wlan0: AP-STA-DISCONNECTED 78:a5:04:26:95:28
wlan0: AP-STA-DISCONNECTED 3c:a9:f4:42:82:88
Traceback (most recent call last):
File "./krack-test-client.py", line 609, in <module>
wlan0: AP-DISABLED
wlan0: CTRL-EVENT-TERMINATING
attack.run(options=options)
File "./krack-test-client.py", line 469, in run
nl80211: deinit ifname=wlan0 disabled_11b_rates=0
sel = select.select([self.sock_mon, self.sock_eth], [], [], 1)
KeyboardInterrupt
[16:11:08] Closing hostapd and cleaning up ...
KERN_INFO: TI WiLink 1283 SDIO: Driver loaded
*** Nucleus Shell ***
SHELL:\>wpa_supplicant v2.1-devel
Global control interface '/var/run/wpa_supplicant'
STA Demo Application
*** Waiting for a STA interface
KERN_INFO: TIWLAN: Found TI/WLAN SDIO controller (vendor 0x4076, device 0x8032c64c, class 0x0)
Setting up SDIO parameters.
SDIO currently running at: 25000000
Configured clock: 25000000, Maximum clock: 52000000
Multi-block capable
Bytes Per Block: 2048 bytes, Block Count:512
Allocating Slot current: 130 mA
Device registered: tiw_drv
+---------------------------+
| wlan_loader: initializing |
+---------------------------+
enable_user_defaults = y !!
KERN_INFO: TIWLAN: 3.000000: cmdInterpret_ConvertAndExecute: DRIVER_START in STO PPED state - handle it
KERN_INFO: TIWLAN: 3.000000: Working on a 185x board.
KERN_INFO: TIWLAN: 3.000000: *******************************************
KERN_INFO: TIWLAN: 3.000000: wl18xx HW: RDL 183x or 180x, PG 2.2 (ROM 0x11)
KERN_INFO: TIWLAN: 3.000000: *******************************************
KERN_INFO: TIWLAN: 3.000000:
****** ClockConfig=0x100 *****
KERN_INFO: TIWLAN: 3.000000:
****** clock_config_freq=0x5 *****
KERN_INFO: TIWLAN: 3.000000:
****** enable both PLLs (WCS and COEX) in the top *****
KERN_INFO: TIWLAN: 3.000000:
****** disable the COEX PLL in the top *****
KERN_INFO: TIWLAN: 3.000000:
****** Locking the PLL *****
KERN_INFO: TIWLAN: 3.000000: Finished downloading firmware.
KERN_INFO: TIWLAN: 3.000000: Firmware running.
Device registered: tiw_sta
KERN_INFO: TIWLAN: 3.000000: wlanDrvIf_Open(), network interface ID=1
Device registered: tiw_sap
KERN_INFO: TIWLAN: 3.000000: wlanDrvIf_Open(), network interface ID=2
KERN_INFO: TIWLAN: 3.000000:
KERN_INFO: TIWLAN: 3.000000: --------------------------------------------------------------------
KERN_INFO: TIWLAN: 3.000000: Driver Version : MCP-8.0.0.52_Release
KERN_INFO: TIWLAN: 3.000000: Firmware Version: Rev 8.9.0.0.38
KERN_INFO: TIWLAN: 3.000000: PHY FW Version : Rev 8.2.0.0.227
KERN_INFO: TIWLAN: 3.000000: WLAN MAC Address: 78-A5-04-26-95-28
KERN_INFO: TIWLAN: 3.000000: --------------------------------------------------------------------
KERN_INFO: TIWLAN: 3.000000:
KERN_INFO: TIWLAN: 4.000000: Interrogate TX/RX parameters
KERN_INFO: TIWLAN: 4.000000: cmdInterpret_ServiceCompleteCB: AsyncCmd is NULL!!
KERN_INFO: TIWLAN: 4.000000: rolesMngr , CONSOLE
enableRole(): ifmode = 2
Device registered: tiw_p2pdev
Device registered: tiw_p2pgrp
Device registered: tiw_ibss
Initializing interface 'tiw_sta' conf 'wpa_sup.cfg' driver 'wilink' ctrl_interface 'N/A' bridge 'N/A'
Reading configuration file 'wpa_sup.cfg'
ctrl_interface='/var/run/wpa_supplicant'
ap_scan=1
Priority group 0
id=0 ssid='test_AP_1'
Reading configuration file '(null)'
Failed to open config file '(null)', error: Success
HOSTAPTIW wilink_global_init: enter
HOSTAPTIW wilink_if_init: enter ifname = tiw_sta
HOSTAPTIW : driver capabilities: key_mgmt 0x6f enc 0xf flags 0x90626a40
HOSTAPTIW wilink_if_init: assigned driver role 1 to the interface
HOSTAPTIW tiwdrv_enable_role: enter
In prepare_enable_role_buff: roleType --> 1
KERN_INFO: TIWLAN: 4.000000: rolesMngr , CONSOLE
enableRole(): ifmode = 1
HOSTAPTIW wilink_toggle_events: enter role = 1 mode = 115
Add interface tiw_sta to a new radio N/A
tiw_sta: Own MAC address: 78:a5:04:26:95:28
HOSTAPTI wilink_set_key: enter
HOSTAPTI wilink_set_key: enter
HOSTAPTI wilink_set_key: enter
HOSTAPTI wilink_set_key: enter
tiw_sta: RSN: flushing PMKID list in the driver
HOSTAPTIW wilink_flush_pmkid: enter
tiw_sta: Total active networks 1
tiw_sta: Added interface tiw_sta
tiw_sta: State: DISCONNECTED -> DISCONNECTED
wilink_set_operstate: operstate 0->0 (DORMANT)
tiw_sta: Starting delayed sched scan
tiw_sta: Add wildcard SSID to sched_scan
tiw_sta: add to filter ssid: test_AP_1
tiw_sta: Starting sched scan: short interval 5 long_interval 30 num_short_intervals 10
HOSTAPTI wilink_driver_sched_scan: enter
HOSTAPTIW init_connection_scan_params: num channels 38
tiwdrv_connection_scan. Scan params are set! uSsidNum = 1
HOSTAPTI: Sched scan requested (ret=0) intervals: short=5000 ms long=30000 ms num_short_intervals=10
*** STA interface detected
tiw_sta: Signal 1 received - reconfiguring
Reading configuration file 'wpa_sup.cfg'
Priority group 5
id=0 ssid='TI_AP'
Reading configuration file '(null)'
Failed to open config file '(null)', error: Success
tiw_sta: State: DISCONNECTED -> DISCONNECTED
wilink_set_operstate: operstate 0->0 (DORMANT)
tiw_sta: Setting scan request: 0 sec 0 usec
tiw_sta: Reconfiguration completed
tiw_sta: State: DISCONNECTED -> SCANNING
tiw_sta: Starting AP scan for wildcard SSID
HOSTAPTI wilink_scan: enter
HOSTAPTI tiwdrv_scan: enter
*** Successfully loaded a new wpa_supplicant configuration
Scan requested (ret=0) - scan timeout 30 seconds
HOSTAPTIW wilink_wireless_event_custom: event=5
HOSTAPTIW wilink_wireless_event_custom: SCAN_COMPLETE event
tiw_sta: Event SCAN_RESULTS (3) received
HOSTAPTI wilink_get_scan_results: enter
Received 9320 bytes of scan results (29 BSSes)
tiw_sta: BSS: Start scan result update 1
tiw_sta: BSS: Add new id 0 BSSID c4:e9:84:d8:98:96 SSID 'TI_AP'
tiw_sta: BSS: Add new id 1 BSSID 84:d4:7e:e6:17:b0 SSID 'MGC'
tiw_sta: BSS: Add new id 2 BSSID f8:d1:11:70:3a:fe SSID 'testap'
tiw_sta: BSS: Add new id 3 BSSID 84:d4:7e:e6:14:d0 SSID 'MGC'
tiw_sta: BSS: Add new id 4 BSSID 84:d4:7e:e6:13:10 SSID 'MGC'
tiw_sta: BSS: Add new id 5 BSSID 84:d4:7e:e6:17:a0 SSID 'MGC'
tiw_sta: BSS: Add new id 6 BSSID 84:d4:7e:e6:14:c0 SSID 'MGC'
tiw_sta: BSS: Add new id 7 BSSID a8:e7:05:f0:5d:05 SSID 'Adnan-Zong'
tiw_sta: BSS: Add new id 8 BSSID 96:53:30:41:30:41 SSID 'DIRECT-41-HP M477 LaserJet'
tiw_sta: BSS: Add new id 9 BSSID 84:d4:7e:e6:13:00 SSID 'MGC'
tiw_sta: BSS: Add new id 10 BSSID 84:d4:7e:e6:11:30 SSID 'MGC'
tiw_sta: BSS: Add new id 11 BSSID 84:d4:7e:e6:22:50 SSID 'MGC'
tiw_sta: BSS: Add new id 12 BSSID 6a:14:01:38:91:3f SSID 'DIRECT-3f-HP M477 LaserJet'
tiw_sta: BSS: Add new id 13 BSSID 84:d4:7e:e6:11:10 SSID 'MGC'
tiw_sta: BSS: Add new id 14 BSSID 84:d4:7e:e6:22:40 SSID 'MGC'
tiw_sta: BSS: Add new id 15 BSSID 84:d4:7e:e6:22:90 SSID 'MGC'
tiw_sta: BSS: Add new id 16 BSSID 84:d4:7e:e6:12:d0 SSID 'MGC'
tiw_sta: BSS: Add new id 17 BSSID 28:8a:1c:29:46:82 SSID 'NCWL_E_Conf_2'
tiw_sta: BSS: Add new id 18 BSSID 84:d4:7e:e6:17:b1 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 19 BSSID 84:d4:7e:e6:14:d1 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 20 BSSID 84:d4:7e:e6:17:a1 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 21 BSSID 84:d4:7e:e6:13:11 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 22 BSSID 84:d4:7e:e6:14:c1 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 23 BSSID 84:d4:7e:e6:13:01 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 24 BSSID 84:d4:7e:e6:22:51 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 25 BSSID 84:d4:7e:e6:11:31 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 26 BSSID 84:d4:7e:e6:11:11 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 27 BSSID 84:d4:7e:e6:22:91 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 28 BSSID 80:2a:a8:7c:87:3a SSID 'CS-AP'
BSS: last_scan_res_used=29/32 last_scan_full=1
tiw_sta: New scan results available
tiw_sta: Selecting BSS from priority group 5
tiw_sta: 0: c4:e9:84:d8:98:96 ssid='TI_AP' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-36
tiw_sta: selected based on RSN IE
tiw_sta: selected BSS c4:e9:84:d8:98:96 ssid='TI_AP'
tiw_sta: Considering connect request: reassociate: 1 selected: c4:e9:84:d8:98:96 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x853c1048 current_ssid=0x0
tiw_sta: Request association with c4:e9:84:d8:98:96
tiw_sta: Trying to associate with c4:e9:84:d8:98:96 (SSID='TI_AP' freq=2412 MHz)
tiw_sta: Cancelling sched scan
HOSTAPTI wilink_driver_stop_sched_scan: enter
tiw_sta: Cancelling scan request
tiw_sta: WPA: clearing own WPA/RSN IE
tiw_sta: Automatic auth_alg selection: 0x1
tiw_sta: RSN: using IEEE 802.11i/D9.0
tiw_sta: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
tiw_sta: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
tiw_sta: WPA: using GTK CCMP
tiw_sta: WPA: using PTK CCMP
tiw_sta: WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
tiw_sta: No keys have been configured - skip key clearing
tiw_sta: State: SCANNING -> ASSOCIATING
wilink_set_operstate: operstate 0->0 (DORMANT)
Limit connection to BSSID c4:e9:84:d8:98:96 freq=2412 MHz based on scan results (bssid_set=0)
HOSTAPTIW wilink_associate: enter, mode = 0 role 1 iface tiw_sta
tiw_sta: Setting authentication timeout: 10 sec 0 usec
HOSTAPTIW wilink_wireless_event_custom: event=39
tiw_sta: Event CHANNEL_LIST_CHANGED (31) received
tiw_sta: Channel list changed restart sched scan.
tiw_sta: Restarting sched scan with new parameters
tiw_sta: Cancelling sched scan
HOSTAPTI wilink_driver_stop_sched_scan: enter
ioctl[ioctl_cmd]
HOSTAPTIWERR wilink_driver_stop_sched_scan: error sending TI_PARAM_STTOP_CONNECTION_SCAN
tiw_sta: Add wildcard SSID to sched_scan
tiw_sta: add to filter ssid: TI_AP
tiw_sta: Starting sched scan: short interval 5 long_interval 30 num_short_intervals 10
HOSTAPTI wilink_driver_sched_scan: enter
HOSTAPTIW init_connection_scan_params: num channels 38
tiwdrv_connection_scan. Scan params are set! uSsidNum = 1
HOSTAPTI: Sched scan requested (ret=0) intervals: short=5000 ms long=30000 ms num_short_intervals=10
HOSTAPTIW wilink_wireless_event_custom: event=6
HOSTAPTIW wilink_wireless_event_custom: SCHED SCAN COMPLETE event
tiw_sta: Event SCHED_SCAN_STOPPED (46) received
HOSTAPTIW wilink_wireless_event_custom: event=42
tiw_sta: RX EAPOL from c4:e9:84:d8:98:96
tiw_sta: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00)
KERN_INFO: TIWLAN: 16.000000: connInfra , ERROR
uIeLen = 29
KERN_INFO: TIWLAN: 16.000000: connInfra , ERROR
mlmeWait_to_obssWait: failed to get OBSS IE
HOSTAPTIW wilink_wireless_event_custom: event=34
AssocReq IE wireless event - hexdump(len=252): 00 05 54 49 5f 41 50 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 7f 01 01 dd 07 00 50 f2 02 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
HOSTAPTIW wilink_wireless_event_custom: event=33
AssocResp IE wireless event - hexdump(len=52): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 7f 08 00 00 00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
HOSTAPTIW wilink_wireless_event_custom: event=32
Beacon IE wireless event - hexdump(len=29): 00 05 54 49 5f 41 50 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
HOSTAPTIW wilink_wireless_event_custom: event=0
HOSTAPTIW wilink_wireless_event_custom: TIW_DRV_EV_ASSOCIATED event
tiw_sta: Event ASSOCINFO (4) received
tiw_sta: Association info event
req_ies - hexdump(len=252): 00 05 54 49 5f 41 50 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 7f 01 01 dd 07 00 50 f2 02 00 0 1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0 0 00 00
resp_ies - hexdump(len=52): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 7f 08 00 00 00 00 00 00 00 40 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
beacon_ies - hexdump(len=29): 00 05 54 49 5f 41 50 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
tiw_sta: freq=2412 MHz
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
tiw_sta: WPA: clearing AP WPA IE
tiw_sta: Event ASSOC (0) received
HOSTAPTIW wilink_get_bssid: enter
tiw_sta: State: ASSOCIATING -> ASSOCIATED
wilink_set_operstate: operstate 0->0 (DORMANT)
tiw_sta: Associated to a new BSS: BSSID=c4:e9:84:d8:98:96
tiw_sta: No keys have been configured - skip key clearing
tiw_sta: Associated with c4:e9:84:d8:98:96
tiw_sta: WPA: Association event - clear replay counter
tiw_sta: WPA: Clear old PTK
tiw_sta: Setting authentication timeout: 10 sec 0 usec
tiw_sta: Cancelling scan request
tiw_sta: cancel_sched_scan called when no sched scan
HOSTAPTIW wilink_wireless_event_custom: event=42
tiw_sta: RX EAPOL from c4:e9:84:d8:98:96
tiw_sta: Setting authentication timeout: 10 sec 0 usec
tiw_sta: IEEE 802.1X RX: version=2 type=3 length=95
tiw_sta: EAPOL-Key type=2
tiw_sta: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
tiw_sta: key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 2d ab 35 1a 6f 4f 97 b9 3f de 98 61 1a 18 b8 8f 8b 0d f3 76 03 06 4d 83 24 a0 48 fa 7a 00 5f df
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
HOSTAPTIW wilink_get_ssid: enter
HOSTAPTIW wilink_get_bssid: enter
tiw_sta: State: ASSOCIATED -> 4WAY_HANDSHAKE
tiw_sta: WPA: RX message 1 of 4-Way Handshake from c4:e9:84:d8:98:96 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 60 45 6f 43 d9 b5 96 8c 88 7b d9 c1 04 d0 ee fb f9 f1 d6 78 3a e2 b4 7d ff de 8b 0c 55 96 82 51
WPA: PTK derivation - A1=78:a5:04:26:95:28 A2=c4:e9:84:d8:98:96
WPA: Nonce1 - hexdump(len=32): 60 45 6f 43 d9 b5 96 8c 88 7b d9 c1 04 d0 ee fb f9 f1 d6 78 3a e2 b4 7d ff de 8b 0c 55 96 82 51
WPA: Nonce2 - hexdump(len=32): 2d ab 35 1a 6f 4f 97 b9 3f de 98 61 1a 18 b8 8f 8b 0d f3 76 03 06 4d 83 24 a0 48 fa 7a 00 5f df
WPA: PMK - hexdump(len=32): a3 eb ca 22 94 33 e4 65 64 af c8 66 7d 78 37 79 13 2e 08 8f de d0 40 5f d0 d3 d6 d9 54 87 e4 5e
WPA: PTK - hexdump(len=48): 14 0b cb 27 9c 61 e5 d1 29 f9 1d d0 75 17 d3 79 8a 2f 30 db 6d 5e 8b 12 1c 9b 55 93 e8 94 56 7d e6 af 4a a8 75 ff b6 2a 06 97 6b a6 d9 27 50 1a
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
tiw_sta: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): 14 0b cb 27 9c 61 e5 d1 29 f9 1d d0 75 17 d3 79
WPA: Derived Key MIC - hexdump(len=16): a7 ec a4 a4 fd 5b 31 f7 30 8f 31 58 70 8b 52 2b
HOSTAPTIW wilink_wireless_event_custom: event=42
tiw_sta: RX EAPOL from c4:e9:84:d8:98:96
tiw_sta: IEEE 802.1X RX: version=2 type=3 length=151
tiw_sta: EAPOL-Key type=2
tiw_sta: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
tiw_sta: key_length=16 key_data_length=56
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): 2d ab 35 1a 6f 4f 97 b9 3f de 98 61 1a 18 b8 8f 8b 0d f3 76 03 06 4d 83 24 a0 48 fa 7a 00 5f df
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 5f 91 21 61 60 94 b9 c8 35 60 57 6d d1 05 5b 18
RSN: encrypted key data - hexdump(len=56): 5e ba 01 1d 60 7c 9f 50 b4 33 1e 0a ca 31 cb 35 47 cc 70 9d ff 90 f2 f7 c7 24 d0 e4 dd 8d e0 fb 11 99 f5 b6 0b cb a5 3a 06 ad 3c e2 40 13 4a 43 47 6a e a fd 14 60 bd 74
WPA: decrypted EAPOL-Key key data - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 30 54 e6 d7 64 e4 d7 4a a8 c8 30 a8 6b bf 66 80 dd 00
tiw_sta: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
tiw_sta: WPA: RX message 3 of 4-Way Handshake from c4:e9:84:d8:98:96 (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 30 54 e6 d7 64 e4 d7 4a a8 c8 30 a8 6b bf 66 80 dd 00
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: GTK in EAPOL-Key - hexdump(len=24): dd 16 00 0f ac 01 01 00 30 54 e6 d7 64 e4 d7 4a a8 c8 30 a8 6b bf 66 80
tiw_sta: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): 14 0b cb 27 9c 61 e5 d1 29 f9 1d d0 75 17 d3 79
WPA: Derived Key MIC - hexdump(len=16): eb f5 8b 67 6c bc 59 4f f1 c9 d3 85 1c e5 45 13
tiw_sta: WPA: Installing PTK to the driver
HOSTAPTI wilink_set_key: enter
tiw_sta: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): 01 00 30 54 e6 d7 64 e4 d7 4a a8 c8 30 a8 6b bf 66 80
WPA: Group Key - hexdump(len=16): 30 54 e6 d7 64 e4 d7 4a a8 c8 30 a8 6b bf 66 80
tiw_sta: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
HOSTAPTI wilink_set_key: enter
tiw_sta: WPA: Key negotiation completed with c4:e9:84:d8:98:96 [PTK=CCMP GTK=CCMP]
tiw_sta: Cancelling authentication timeout
tiw_sta: State: GROUP_HANDSHAKE -> COMPLETED
tiw_sta: CTRL-EVENT-CONNECTED - Connection to c4:e9:84:d8:98:96 completed (auth) [id=0 id_str=]
wilink_set_operstate: operstate 0->1 (UP)
KERN_INFO: TIWLAN: 16.000000: ************ NEW CONNECTION ************
KERN_INFO: TIWLAN: 16.000000: roleSta , CONSOLE
-- BSSID = c4-e9-84-d8-98-96
KERN_INFO: TIWLAN: 16.000000: -- SSID = TI_AP
KERN_INFO: TIWLAN: 16.000000: -- BSSID = c4-e9-84-d8-98-96
KERN_INFO: TIWLAN: 16.000000: ****************************************
HOSTAPTIW wilink_wireless_event_custom: event=22
HOSTAPTIW wilink_wireless_event_custom: SCHED SCAN REPORT event
tiw_sta: Event SCAN_RESULTS (3) received
HOSTAPTI wilink_get_scan_results: enter
Received 224 bytes of scan results (1 BSSes)
tiw_sta: BSS: Start scan result update 2
BSS: last_scan_res_used=1/32 last_scan_full=1
tiw_sta: New scan results available
tiw_sta: Selecting BSS from priority group 5
tiw_sta: 0: c4:e9:84:d8:98:96 ssid='TI_AP' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-48
tiw_sta: selected based on RSN IE
tiw_sta: selected BSS c4:e9:84:d8:98:96 ssid='TI_AP'
tiw_sta: BSS: Remove id 1 BSSID 84:d4:7e:e6:17:b0 SSID 'MGC' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 2 BSSID f8:d1:11:70:3a:fe SSID 'testap' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 3 BSSID 84:d4:7e:e6:14:d0 SSID 'MGC' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 4 BSSID 84:d4:7e:e6:13:10 SSID 'MGC' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 5 BSSID 84:d4:7e:e6:17:a0 SSID 'MGC' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 6 BSSID 84:d4:7e:e6:14:c0 SSID 'MGC' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 7 BSSID a8:e7:05:f0:5d:05 SSID 'Adnan-Zong' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 8 BSSID 96:53:30:41:30:41 SSID 'DIRECT-41-HP M477 LaserJet' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 9 BSSID 84:d4:7e:e6:13:00 SSID 'MGC' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 10 BSSID 84:d4:7e:e6:11:30 SSID 'MGC' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 11 BSSID 84:d4:7e:e6:22:50 SSID 'MGC' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 12 BSSID 6a:14:01:38:91:3f SSID 'DIRECT-3f-HP M477 LaserJet' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 13 BSSID 84:d4:7e:e6:11:10 SSID 'MGC' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 14 BSSID 84:d4:7e:e6:22:40 SSID 'MGC' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 15 BSSID 84:d4:7e:e6:22:90 SSID 'MGC' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 16 BSSID 84:d4:7e:e6:12:d0 SSID 'MGC' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 17 BSSID 28:8a:1c:29:46:82 SSID 'NCWL_E_Conf_2' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 18 BSSID 84:d4:7e:e6:17:b1 SSID 'MentorGuest' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 19 BSSID 84:d4:7e:e6:14:d1 SSID 'MentorGuest' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 20 BSSID 84:d4:7e:e6:17:a1 SSID 'MentorGuest' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 21 BSSID 84:d4:7e:e6:13:11 SSID 'MentorGuest' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 22 BSSID 84:d4:7e:e6:14:c1 SSID 'MentorGuest' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 23 BSSID 84:d4:7e:e6:13:01 SSID 'MentorGuest' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 24 BSSID 84:d4:7e:e6:22:51 SSID 'MentorGuest' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 25 BSSID 84:d4:7e:e6:11:31 SSID 'MentorGuest' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 26 BSSID 84:d4:7e:e6:11:11 SSID 'MentorGuest' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 27 BSSID 84:d4:7e:e6:22:91 SSID 'MentorGuest' due to wpa_bss_flush_by_age
tiw_sta: BSS: Remove id 28 BSSID 80:2a:a8:7c:87:3a SSID 'CS-AP' due to wpa_bss_flush_by_age
HOSTAPTIW wilink_wireless_event_custom: event=1
HOSTAPTIW wilink_wireless_event_custom: TIW_DRV_EV_DISASSOCIATED event
tiw_sta: Event DISASSOC (1) received
tiw_sta: Disassociation notification
tiw_sta: * reason 3
Disassociation frame IE(s) - hexdump(len=0): [NULL]
tiw_sta: CTRL-EVENT-DISCONNECTED bssid=c4:e9:84:d8:98:96 reason=3
tiw_sta: Auto connect enabled: try to reconnect (wps=0 wpa_state=9)
tiw_sta: Setting scan request: 0 sec 100000 usec
Added BSSID c4:e9:84:d8:98:96 into blacklist
tiw_sta: Blacklist count 1 --> request scan in 100 ms
tiw_sta: Setting scan request: 0 sec 100000 usec
tiw_sta: Disconnect event - remove keys
HOSTAPTI wilink_set_key: enter
HOSTAPTI wilink_set_key: enter
HOSTAPTI wilink_set_key: enter
HOSTAPTI wilink_set_key: enter
HOSTAPTI wilink_set_key: enter
tiw_sta: State: COMPLETED -> DISCONNECTED
wilink_set_operstate: operstate 1->0 (DORMANT)
tiw_sta: State: DISCONNECTED -> SCANNING
tiw_sta: Starting AP scan for wildcard SSID
HOSTAPTI wilink_scan: enter
HOSTAPTI tiwdrv_scan: enter
Scan requested (ret=0) - scan timeout 30 seconds
HOSTAPTIW wilink_wireless_event_custom: event=5
HOSTAPTIW wilink_wireless_event_custom: SCAN_COMPLETE event
tiw_sta: Event SCAN_RESULTS (3) received
HOSTAPTI wilink_get_scan_results: enter
Received 8916 bytes of scan results (29 BSSes)
tiw_sta: BSS: Start scan result update 3
tiw_sta: BSS: Add new id 29 BSSID 84:d4:7e:e6:17:b0 SSID 'MGC'
tiw_sta: BSS: Add new id 30 BSSID 84:d4:7e:e6:14:d0 SSID 'MGC'
tiw_sta: BSS: Add new id 31 BSSID f8:d1:11:70:3a:fe SSID 'testap'
tiw_sta: BSS: Add new id 32 BSSID 84:d4:7e:e6:13:10 SSID 'MGC'
tiw_sta: BSS: Add new id 33 BSSID 84:d4:7e:e6:17:a0 SSID 'MGC'
tiw_sta: BSS: Add new id 34 BSSID 84:d4:7e:e6:14:c0 SSID 'MGC'
tiw_sta: BSS: Add new id 35 BSSID 96:53:30:41:30:41 SSID 'DIRECT-41-HP M477 LaserJet'
tiw_sta: BSS: Add new id 36 BSSID 84:d4:7e:e6:22:50 SSID 'MGC'
tiw_sta: BSS: Add new id 37 BSSID 84:d4:7e:e6:11:20 SSID 'MGC'
tiw_sta: BSS: Add new id 38 BSSID 84:d4:7e:e6:13:00 SSID 'MGC'
tiw_sta: BSS: Add new id 39 BSSID 84:d4:7e:e6:11:30 SSID 'MGC'
tiw_sta: BSS: Add new id 40 BSSID 84:d4:7e:e6:11:10 SSID 'MGC'
tiw_sta: BSS: Add new id 41 BSSID 84:d4:7e:e6:22:40 SSID 'MGC'
tiw_sta: BSS: Add new id 42 BSSID 28:8a:1c:29:46:82 SSID 'NCWL_E_Conf_2'
tiw_sta: BSS: Add new id 43 BSSID 28:8a:1c:29:46:80 SSID 'NCWL_P_Conf_4'
tiw_sta: BSS: Add new id 44 BSSID c4:6e:1f:9f:26:92 SSID 'TP-LINK'
tiw_sta: BSS: Add new id 45 BSSID 84:d4:7e:e6:11:00 SSID 'MGC'
tiw_sta: BSS: Add new id 46 BSSID 4a:d9:e7:0b:9a:70 SSID 'sjs'
tiw_sta: BSS: Add new id 47 BSSID 84:d4:7e:e6:17:b1 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 48 BSSID 84:d4:7e:e6:14:d1 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 49 BSSID 84:d4:7e:e6:13:11 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 50 BSSID 84:d4:7e:e6:17:a1 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 51 BSSID 84:d4:7e:e6:14:c1 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 52 BSSID 84:d4:7e:e6:11:21 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 53 BSSID 84:d4:7e:e6:13:01 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 54 BSSID 84:d4:7e:e6:22:51 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 55 BSSID 84:d4:7e:e6:11:31 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 56 BSSID 84:d4:7e:e6:22:41 SSID 'MentorGuest'
tiw_sta: BSS: Add new id 57 BSSID 84:d4:7e:e6:18:41 SSID 'MentorGuest'
BSS: last_scan_res_used=29/32 last_scan_full=1
tiw_sta: New scan results available
tiw_sta: Selecting BSS from priority group 5
tiw_sta: 0: 84:d4:7e:e6:17:b0 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-55
tiw_sta: skip - SSID mismatch
tiw_sta: 1: 84:d4:7e:e6:14:d0 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-59
tiw_sta: skip - SSID mismatch
tiw_sta: 2: f8:d1:11:70:3a:fe ssid='testap' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=-57
tiw_sta: skip - SSID mismatch
tiw_sta: 3: 84:d4:7e:e6:13:10 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-64
tiw_sta: skip - SSID mismatch
tiw_sta: 4: 84:d4:7e:e6:17:a0 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-60
tiw_sta: skip - SSID mismatch
tiw_sta: 5: 84:d4:7e:e6:14:c0 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-67
tiw_sta: skip - SSID mismatch
tiw_sta: 6: 96:53:30:41:30:41 ssid='DIRECT-41-HP M477 LaserJet' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-71 wps
tiw_sta: skip - SSID mismatch
tiw_sta: 7: 84:d4:7e:e6:22:50 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-79
tiw_sta: skip - SSID mismatch
tiw_sta: 8: 84:d4:7e:e6:11:20 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-75
tiw_sta: skip - SSID mismatch
tiw_sta: 9: 84:d4:7e:e6:13:00 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-76
tiw_sta: skip - SSID mismatch
tiw_sta: 10: 84:d4:7e:e6:11:30 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-82
tiw_sta: skip - SSID mismatch
tiw_sta: 11: 84:d4:7e:e6:11:10 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-86
tiw_sta: skip - SSID mismatch
tiw_sta: 12: 84:d4:7e:e6:22:40 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-85
tiw_sta: skip - SSID mismatch
tiw_sta: 13: 28:8a:1c:29:46:82 ssid='NCWL_E_Conf_2' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 level=-86
tiw_sta: skip - SSID mismatch
tiw_sta: 14: 28:8a:1c:29:46:80 ssid='NCWL_P_Conf_4' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=-87
tiw_sta: skip - SSID mismatch
tiw_sta: 15: c4:6e:1f:9f:26:92 ssid='TP-LINK' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 level=-88 wps
tiw_sta: skip - SSID mismatch
tiw_sta: 16: 84:d4:7e:e6:11:00 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-88
tiw_sta: skip - SSID mismatch
tiw_sta: 17: 4a:d9:e7:0b:9a:70 ssid='sjs' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 level=-89
tiw_sta: skip - SSID mismatch
tiw_sta: 18: 84:d4:7e:e6:17:b1 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-55
tiw_sta: skip - SSID mismatch
tiw_sta: 19: 84:d4:7e:e6:14:d1 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-58
tiw_sta: skip - SSID mismatch
tiw_sta: 20: 84:d4:7e:e6:13:11 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-64
tiw_sta: skip - SSID mismatch
tiw_sta: 21: 84:d4:7e:e6:17:a1 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-60
tiw_sta: skip - SSID mismatch
tiw_sta: 22: 84:d4:7e:e6:14:c1 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-66
tiw_sta: skip - SSID mismatch
tiw_sta: 23: 84:d4:7e:e6:11:21 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-74
tiw_sta: skip - SSID mismatch
tiw_sta: 24: 84:d4:7e:e6:13:01 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-75
tiw_sta: skip - SSID mismatch
tiw_sta: 25: 84:d4:7e:e6:22:51 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-81
tiw_sta: skip - SSID mismatch
tiw_sta: 26: 84:d4:7e:e6:11:31 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-83
tiw_sta: skip - SSID mismatch
tiw_sta: 27: 84:d4:7e:e6:22:41 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-85
tiw_sta: skip - SSID mismatch
tiw_sta: 28: 84:d4:7e:e6:18:41 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-88
tiw_sta: skip - SSID mismatch
tiw_sta: No APs found - clear blacklist and try again
Removed BSSID c4:e9:84:d8:98:96 from blacklist (clear)
tiw_sta: Selecting BSS from priority group 5
tiw_sta: 0: 84:d4:7e:e6:17:b0 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-55
tiw_sta: skip - SSID mismatch
tiw_sta: 1: 84:d4:7e:e6:14:d0 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-59
tiw_sta: skip - SSID mismatch
tiw_sta: 2: f8:d1:11:70:3a:fe ssid='testap' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=-57
tiw_sta: skip - SSID mismatch
tiw_sta: 3: 84:d4:7e:e6:13:10 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-64
tiw_sta: skip - SSID mismatch
tiw_sta: 4: 84:d4:7e:e6:17:a0 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-60
tiw_sta: skip - SSID mismatch
tiw_sta: 5: 84:d4:7e:e6:14:c0 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-67
tiw_sta: skip - SSID mismatch
tiw_sta: 6: 96:53:30:41:30:41 ssid='DIRECT-41-HP M477 LaserJet' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-71 wps
tiw_sta: skip - SSID mismatch
tiw_sta: 7: 84:d4:7e:e6:22:50 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-79
tiw_sta: skip - SSID mismatch
tiw_sta: 8: 84:d4:7e:e6:11:20 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-75
tiw_sta: skip - SSID mismatch
tiw_sta: 9: 84:d4:7e:e6:13:00 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-76
tiw_sta: skip - SSID mismatch
tiw_sta: 10: 84:d4:7e:e6:11:30 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-82
tiw_sta: skip - SSID mismatch
tiw_sta: 11: 84:d4:7e:e6:11:10 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-86
tiw_sta: skip - SSID mismatch
tiw_sta: 12: 84:d4:7e:e6:22:40 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-85
tiw_sta: skip - SSID mismatch
tiw_sta: 13: 28:8a:1c:29:46:82 ssid='NCWL_E_Conf_2' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 level=-86
tiw_sta: skip - SSID mismatch
tiw_sta: 14: 28:8a:1c:29:46:80 ssid='NCWL_P_Conf_4' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=-87
tiw_sta: skip - SSID mismatch
tiw_sta: 15: c4:6e:1f:9f:26:92 ssid='TP-LINK' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 level=-88 wps
tiw_sta: skip - SSID mismatch
tiw_sta: 16: 84:d4:7e:e6:11:00 ssid='MGC' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-88
tiw_sta: skip - SSID mismatch
tiw_sta: 17: 4a:d9:e7:0b:9a:70 ssid='sjs' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 level=-89
tiw_sta: skip - SSID mismatch
tiw_sta: 18: 84:d4:7e:e6:17:b1 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-55
tiw_sta: skip - SSID mismatch
tiw_sta: 19: 84:d4:7e:e6:14:d1 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-58
tiw_sta: skip - SSID mismatch
tiw_sta: 20: 84:d4:7e:e6:13:11 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-64
tiw_sta: skip - SSID mismatch
tiw_sta: 21: 84:d4:7e:e6:17:a1 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-60
tiw_sta: skip - SSID mismatch
tiw_sta: 22: 84:d4:7e:e6:14:c1 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-66
tiw_sta: skip - SSID mismatch
tiw_sta: 23: 84:d4:7e:e6:11:21 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-74
tiw_sta: skip - SSID mismatch
tiw_sta: 24: 84:d4:7e:e6:13:01 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-75
tiw_sta: skip - SSID mismatch
tiw_sta: 25: 84:d4:7e:e6:22:51 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-81
tiw_sta: skip - SSID mismatch
tiw_sta: 26: 84:d4:7e:e6:11:31 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-83
tiw_sta: skip - SSID mismatch
tiw_sta: 27: 84:d4:7e:e6:22:41 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-85
tiw_sta: skip - SSID mismatch
tiw_sta: 28: 84:d4:7e:e6:18:41 ssid='MentorGuest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-88
tiw_sta: skip - SSID mismatch
tiw_sta: No suitable network found
tiw_sta: Add wildcard SSID to sched_scan
tiw_sta: add to filter ssid: TI_AP
tiw_sta: Starting sched scan: short interval 5 long_interval 30 num_short_intervals 10
HOSTAPTI wilink_driver_sched_scan: enter
HOSTAPTIW init_connection_scan_params: num channels 38
tiwdrv_connection_scan. Scan params are set! uSsidNum = 1
HOSTAPTI: Sched scan requested (ret=0) intervals: short=5000 ms long=30000 ms num_short_intervals=10
tiw_sta: Total active networks 1
KERN_ERR: generic_write_bytes: function 0 sdio error: -34
KERN_ERR: generic_write_bytes: function 0 sdio error: -34
tiw_sta: Removing interface tiw_sta
tiw_sta: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=SCANNING
tiw_sta: No keys have been configured - skip key clearing
tiw_sta: State: SCANNING -> DISCONNECTED
wilink_set_operstate: operstate 0->0 (DORMANT)
ioctl[ioctl_cmd]
wilink_set_operstate: error sending TI_PARAM_PORT_STATUS command to the driver
Wilink: Unable to change link state.
tiw_sta: No keys have been configured - skip key clearing
tiw_sta: BSS: Remove id 0 BSSID c4:e9:84:d8:98:96 SSID 'TI_AP' due to wpa_bss_flush
tiw_sta: BSS: Remove id 29 BSSID 84:d4:7e:e6:17:b0 SSID 'MGC' due to wpa_bss_flush
tiw_sta: BSS: Remove id 30 BSSID 84:d4:7e:e6:14:d0 SSID 'MGC' due to wpa_bss_flush
tiw_sta: BSS: Remove id 31 BSSID f8:d1:11:70:3a:fe SSID 'testap' due to wpa_bss_flush
tiw_sta: BSS: Remove id 32 BSSID 84:d4:7e:e6:13:10 SSID 'MGC' due to wpa_bss_flush
tiw_sta: BSS: Remove id 33 BSSID 84:d4:7e:e6:17:a0 SSID 'MGC' due to wpa_bss_flush
tiw_sta: BSS: Remove id 34 BSSID 84:d4:7e:e6:14:c0 SSID 'MGC' due to wpa_bss_flush
tiw_sta: BSS: Remove id 35 BSSID 96:53:30:41:30:41 SSID 'DIRECT-41-HP M477 LaserJet' due to wpa_bss_flush
tiw_sta: BSS: Remove id 36 BSSID 84:d4:7e:e6:22:50 SSID 'MGC' due to wpa_bss_flush
tiw_sta: BSS: Remove id 37 BSSID 84:d4:7e:e6:11:20 SSID 'MGC' due to wpa_bss_flush
tiw_sta: BSS: Remove id 38 BSSID 84:d4:7e:e6:13:00 SSID 'MGC' due to wpa_bss_flush
tiw_sta: BSS: Remove id 39 BSSID 84:d4:7e:e6:11:30 SSID 'MGC' due to wpa_bss_flush
tiw_sta: BSS: Remove id 40 BSSID 84:d4:7e:e6:11:10 SSID 'MGC' due to wpa_bss_flush
tiw_sta: BSS: Remove id 41 BSSID 84:d4:7e:e6:22:40 SSID 'MGC' due to wpa_bss_flush
tiw_sta: BSS: Remove id 42 BSSID 28:8a:1c:29:46:82 SSID 'NCWL_E_Conf_2' due to wpa_bss_flush
tiw_sta: BSS: Remove id 43 BSSID 28:8a:1c:29:46:80 SSID 'NCWL_P_Conf_4' due to wpa_bss_flush
tiw_sta: BSS: Remove id 44 BSSID c4:6e:1f:9f:26:92 SSID 'TP-LINK' due to wpa_bss_flush
tiw_sta: BSS: Remove id 45 BSSID 84:d4:7e:e6:11:00 SSID 'MGC' due to wpa_bss_flush
tiw_sta: BSS: Remove id 46 BSSID 4a:d9:e7:0b:9a:70 SSID 'sjs' due to wpa_bss_flush
tiw_sta: BSS: Remove id 47 BSSID 84:d4:7e:e6:17:b1 SSID 'MentorGuest' due to wpa_bss_flush
tiw_sta: BSS: Remove id 48 BSSID 84:d4:7e:e6:14:d1 SSID 'MentorGuest' due to wpa_bss_flush
tiw_sta: BSS: Remove id 49 BSSID 84:d4:7e:e6:13:11 SSID 'MentorGuest' due to wpa_bss_flush
tiw_sta: BSS: Remove id 50 BSSID 84:d4:7e:e6:17:a1 SSID 'MentorGuest' due to wpa_bss_flush
tiw_sta: BSS: Remove id 51 BSSID 84:d4:7e:e6:14:c1 SSID 'MentorGuest' due to wpa_bss_flush
tiw_sta: BSS: Remove id 52 BSSID 84:d4:7e:e6:11:21 SSID 'MentorGuest' due to wpa_bss_flush
tiw_sta: BSS: Remove id 53 BSSID 84:d4:7e:e6:13:01 SSID 'MentorGuest' due to wpa_bss_flush
tiw_sta: BSS: Remove id 54 BSSID 84:d4:7e:e6:22:51 SSID 'MentorGuest' due to wpa_bss_flush
tiw_sta: BSS: Remove id 55 BSSID 84:d4:7e:e6:11:31 SSID 'MentorGuest' due to wpa_bss_flush
tiw_sta: BSS: Remove id 56 BSSID 84:d4:7e:e6:22:41 SSID 'MentorGuest' due to wpa_bss_flush
tiw_sta: BSS: Remove id 57 BSSID 84:d4:7e:e6:18:41 SSID 'MentorGuest' due to wpa_bss_flush
tiw_sta: Cancelling delayed sched scan
tiw_sta: Cancelling scan request
tiw_sta: Cancelling authentication timeout
tiw_sta: Cancelling sched scan
HOSTAPTI wilink_driver_stop_sched_scan: enter
ioctl[ioctl_cmd]
HOSTAPTIWERR wilink_driver_stop_sched_scan: error sending TI_PARAM_STTOP_CONNECTION_SCAN
Remove interface tiw_sta from radio
Remove radio
HOSTAPTIW wilink_deinit: enter
RTM_DELLINK, IFLA_IFNAME: Interface 'tiw_sta' removed
tiw_sta: Event INTERFACE_STATUS (5) received
tiw_sta: Configured interface was removed
tiw_sta: State: DISCONNECTED -> DISCONNECTED
wilink_set_operstate: operstate 0->0 (DORMANT)
ioctl[ioctl_cmd]
wilink_set_operstate: error sending TI_PARAM_PORT_STATUS command to the driver
Wilink: Unable to change link state.
tiw_sta: State: DISCONNECTED -> INTERFACE_DISABLED
HOSTAPTIW wilink_toggle_events: enter role = 1 mode = 116
ioctl[ioctl_cmd]
ioctl[ioctl_cmd]
ioctl[ioctl_cmd]
ioctl[ioctl_cmd]
ioctl[ioctl_cmd]
ioctl[ioctl_cmd]
ioctl[ioctl_cmd]
ioctl[ioctl_cmd]
ioctl[ioctl_cmd]
ioctl[ioctl_cmd]
ioctl[ioctl_cmd]
ioctl[ioctl_cmd]
ioctl[ioctl_cmd]
ioctl[ioctl_cmd]
ioctl[ioctl_cmd]
ioctl[ioctl_cmd]
ioctl[ioctl_cmd]
ioctl[ioctl_cmd]
ioctl[ioctl_cmd]
ioctl[ioctl_cmd]
ioctl[ioctl_cmd]
HOSTAPTIERR wilink_deinit: error sending TI_PARAM_DISABLE_ROLE command to the driver
Wilink: Unable to change link state.
tiw_sta: CTRL-EVENT-TERMINATING