linux42live
Goto Top

WLAN-Verbindung mit WPA-Supplicant verbindet nicht

Hallo zusammen,

folgend beschreibe ich mein Problem mit WPA_Supplicants unter Debian 506 32bit.

Ich hatte vor einiger Zeit die Idee mir eine WLAN-Bridge aus einem kleinen PC und einem Wlan-Stick zu bauen.
Dazu habe ich mir dem 'WLAN_Stick "TL-WN321G" gekauft, diesen an den PC angeschlossen und dann ein Debian der Version 506 installiert.

Firmware des Sticks habe ich mir dann manuell gezogen und unter /lib/firmware/ abgelegt.

Alles schön und gut nur nun möchte ich eine Verbindung zu meinem WLAN-Netzwerk aufbauen und dies via WPA_Supplicants machen.
Infos zum Netzwerk:
- Name: EasyBox-BC1705
- Verschlüsselung: WPA2
- Methode: WPA-PSK
- Passwort: 4198A6197

Ich habe eine Konfigurationsdatei angelegt die wie folgt aussieht:

/etc/wlan/wpa2-config:

ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0

eapol_version=1
ap_scan=1
fast_reauth=1
## Associate with any open access point
## Scans/ESSID changes can be done with wpa_cli
network={
ssid="EasyBox-BC1705"
scan_ssid=1
proto=WPA
key_mgmt=WPA-PSK
auth_alg=OPEN
pairwise=TKIP
psk="4198A6197"
}


Nun versuche ich mit dem Befehl

wpa_supplicant -D wext -i wlan0 -c /etc/wlan/config-wpa2 -dd

eine Verbindung zu schaffen, aber es funktioniert nicht.


Folgender Output:


Initializing interface 'wlan0' conf '/etc/wlan/config-wpa2' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wlan/config-wpa2' -> '/etc/wlan/config-wpa2'
Reading configuration file '/etc/wlan/config-wpa2'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group='0' (DEPRECATED)
eapol_version=1
ap_scan=1
fast_reauth=1
Line: 9 - start of a new network block
ssid - hexdump_ascii(len=14):
45 61 73 79 42 6f 78 2d 42 43 31 37 30 35 EasyBox-BC1705
scan_ssid=1 (0x1)
proto: 0x1
key_mgmt: 0x2
auth_alg: 0x1
pairwise: 0x8
PSK (ASCII passphrase) - hexdump_ascii(len=9): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Line 17: removed CCMP from group cipher list since it was not allowed for pairwise cipher
Priority group 0
id=0 ssid='EasyBox-BC1705'
Initializing interface (2) 'wlan0'
Interface wlan0 set UP - waiting a second for the driver to complete initialization
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf flags 0x0
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 94:0c:6d:8e:b4:7d
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
ctrl_interface_group=0
Added interface wlan0
Ignore event for foreign ifindex 3
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b19 len=8
Received 290 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:08:bc:17:cf ssid='EasyBox-BC1705' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
selected based on WPA IE
selected WPA AP 00:23:08:bc:17:cf ssid='EasyBox-BC1705'
Try to find non-WPA AP
Trying to associate with 00:23:08:bc:17:cf (SSID='EasyBox-BC1705' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
Overriding auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02 00 00
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 01 00
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: DISCONNECTED -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: added PMKSA cache candidate 00:23:08:bc:17:cf prio 1000
RSN: processing PMKSA candidate list
RSN: not in suitable state for new pre-authentication
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=22
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8c02 len=249
WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=000e45617379426f782d424331373035010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202dd070050f202000100 RespIEs=010882848b961224486c32040c183060dd180050f2020101000003a4000027a4000042435e0062322f00)'
Association info event
req_ies - hexdump(len=65): 00 0e 45 61 73 79 42 6f 78 2d 42 43 31 37 30 35 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:23:08:bc:17:cf
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:23:08:bc:17:cf
No keys have been configured - skip key clearing
Associated with 00:23:08:bc:17:cf
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:23:08:bc:17:cf
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 15 31 f4 c0 83 ab a6 95 05 ff 9c 05 10 1b 1d 10 c1 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 43 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 15 31
key_nonce - hexdump(len=32): f4 c0 83 ab a6 95 05 ff 9c 05 10 1b 1d 10 c1 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 43 1a
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 15 31 f4 c0 83 ab a6 95 05 ff 9c 05 10 1b 1d 10 c1 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 43 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:08:bc:17:cf (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 8a 19 ba 79 fe 3e 0e 87 70 e3 cc 06 55 0a 4a 4e 65 1d b7 d3 4f 33 dd 6f d9 60 af db 9c 7a 3a e2
WPA: PTK derivation - A1=94:0c:6d:8e:b4:7d A2=00:23:08:bc:17:cf
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 15 31 8a 19 ba 79 fe 3e 0e 87 70 e3 cc 06 55 0a 4a 4e 65 1d b7 d3 4f 33 dd 6f d9 60 af db 9c 7a 3a e2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 9e ac b4 75 89 ad 23 29 4f ce 79 65 ba 06 d8 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:23:08:bc:17:cf
RX EAPOL - hexdump(len=129): 01 03 00 7d fe 01 c9 00 20 00 00 00 00 00 00 15 32 f4 c0 83 ab a6 95 05 ff 9c 05 10 1b 1d 10 c1 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 43 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 96 58 7d 6b 4f 31 b0 1e 17 71 b6 73 91 3e f4 a9 00 1e dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02 00 00
IEEE 802.1X RX: version=1 type=3 length=125
EAPOL-Key type=254
key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=32 key_data_length=30
replay_counter - hexdump(len=8): 00 00 00 00 00 00 15 32
key_nonce - hexdump(len=32): f4 c0 83 ab a6 95 05 ff 9c 05 10 1b 1d 10 c1 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 43 1a
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 96 58 7d 6b 4f 31 b0 1e 17 71 b6 73 91 3e f4 a9
WPA: RX EAPOL-Key - hexdump(len=129): 01 03 00 7d fe 01 c9 00 20 00 00 00 00 00 00 15 32 f4 c0 83 ab a6 95 05 ff 9c 05 10 1b 1d 10 c1 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 43 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 96 58 7d 6b 4f 31 b0 1e 17 71 b6 73 91 3e f4 a9 00 1e dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:23:08:bc:17:cf (ver=1)
WPA: IE KeyData - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02 00 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 15 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3a 2b c3 fe 0d d3 91 e0 4e 0b f4 90 71 54 03 dc 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:23:08:bc:17:cf
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 15 33 f4 c0 83 ab a6 90 0d ff 9c 05 10 1b 1d 10 c1 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 3e 22 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 43 ed 32 36 00 00 00 00 00 00 00 00 00 00 00 00 00 5d 83 e4 16 e6 fb df d5 90 80 92 9a 44 75 e5 7e 00 20 30 e2 96 1b 5a d8 ed f1 2f e1 a6 2a 70 59 85 26 5b 82 06 46 dc 87 6e 5e ae e2 85 9d 6a fa 26 08
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 00 00 00 00 00 00 15 33
key_nonce - hexdump(len=32): f4 c0 83 ab a6 90 0d ff 9c 05 10 1b 1d 10 c1 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 3e 22
key_iv - hexdump(len=16): e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 43
key_rsc - hexdump(len=8): ed 32 36 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 5d 83 e4 16 e6 fb df d5 90 80 92 9a 44 75 e5 7e
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 15 33 f4 c0 83 ab a6 90 0d ff 9c 05 10 1b 1d 10 c1 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 3e 22 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 43 ed 32 36 00 00 00 00 00 00 00 00 00 00 00 00 00 5d 83 e4 16 e6 fb df d5 90 80 92 9a 44 75 e5 7e 00 20 30 e2 96 1b 5a d8 ed f1 2f e1 a6 2a 70 59 85 26 5b 82 06 46 dc 87 6e 5e ae e2 85 9d 6a fa 26 08
WPA: RX message 1 of Group Key Handshake from 00:23:08:bc:17:cf (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32).
WPA: RSC - hexdump(len=6): ed 32 36 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 15 33 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 63 49 df 7f 70 61 92 21 09 ff 70 69 c7 e9 27 d1 00 00
WPA: Key negotiation completed with 00:23:08:bc:17:cf [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:23:08:bc:17:cf completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RSN: processing PMKSA candidate list
RSN: not in suitable state for new pre-authentication
EAPOL: startWhen --> 0
EAPOL: disable timer tick
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:23:08:bc:17:cf into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=14):
45 61 73 79 42 6f 78 2d 42 43 31 37 30 35 EasyBox-BC1705
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 290 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:08:bc:17:cf ssid='EasyBox-BC1705' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
selected based on WPA IE
selected WPA AP 00:23:08:bc:17:cf ssid='EasyBox-BC1705'
Try to find non-WPA AP
Trying to associate with 00:23:08:bc:17:cf (SSID='EasyBox-BC1705' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
Overriding auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02 00 00
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 01 00
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=22
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8c02 len=249
WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=000e45617379426f782d424331373035010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202dd070050f202000100 RespIEs=010882848b961224486c32040c183060dd180050f2020101000003a4000027a4000042435e0062322f00)'
Association info event
req_ies - hexdump(len=65): 00 0e 45 61 73 79 42 6f 78 2d 42 43 31 37 30 35 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:23:08:bc:17:cf
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:23:08:bc:17:cf
No keys have been configured - skip key clearing
Associated with 00:23:08:bc:17:cf
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:23:08:bc:17:cf
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 15 34 f4 c0 83 ab a6 95 07 ff 9c 05 10 1b 1d 10 c1 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 43 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 15 34
key_nonce - hexdump(len=32): f4 c0 83 ab a6 95 07 ff 9c 05 10 1b 1d 10 c1 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 43 1c
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 15 34 f4 c0 83 ab a6 95 07 ff 9c 05 10 1b 1d 10 c1 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 43 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:08:bc:17:cf (ver=1)
WPA: Renewed SNonce - hexdump(len=32): f1 d1 15 fe 6f 7f 5f b0 ed 0d 6f a2 d8 d4 9a 06 3e ce 8a 16 dd e5 2f e8 e3 66 dd fa 17 64 eb 3e
WPA: PTK derivation - A1=94:0c:6d:8e:b4:7d A2=00:23:08:bc:17:cf
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 15 34 f1 d1 15 fe 6f 7f 5f b0 ed 0d 6f a2 d8 d4 9a 06 3e ce 8a 16 dd e5 2f e8 e3 66 dd fa 17 64 eb 3e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 66 43 41 1b 3c c2 f0 e3 9e 7b 32 c5 f9 88 2f 7b 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:23:08:bc:17:cf
RX EAPOL - hexdump(len=129): 01 03 00 7d fe 01 c9 00 20 00 00 00 00 00 00 15 35 f4 c0 83 ab a6 95 07 ff 9c 05 10 1b 1d 10 c1 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 43 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4d 11 35 89 3c d2 96 29 e1 6b c1 12 ba 26 56 ad 00 1e dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02 00 00
IEEE 802.1X RX: version=1 type=3 length=125
EAPOL-Key type=254
key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=32 key_data_length=30
replay_counter - hexdump(len=8): 00 00 00 00 00 00 15 35
key_nonce - hexdump(len=32): f4 c0 83 ab a6 95 07 ff 9c 05 10 1b 1d 10 c1 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 43 1c
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 4d 11 35 89 3c d2 96 29 e1 6b c1 12 ba 26 56 ad
WPA: RX EAPOL-Key - hexdump(len=129): 01 03 00 7d fe 01 c9 00 20 00 00 00 00 00 00 15 35 f4 c0 83 ab a6 95 07 ff 9c 05 10 1b 1d 10 c1 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 43 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4d 11 35 89 3c d2 96 29 e1 6b c1 12 ba 26 56 ad 00 1e dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:23:08:bc:17:cf (ver=1)
WPA: IE KeyData - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02 00 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 15 35 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd 07 d6 dc f1 4d 80 06 04 3d da d7 be ff f4 28 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:23:08:bc:17:cf
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 15 36 f4 c0 83 ab a6 90 0d ff 9c 05 10 1b 1d 10 c1 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 3e 22 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 43 54 35 36 00 00 00 00 00 00 00 00 00 00 00 00 00 c2 77 fa 34 70 04 8e 1c 83 25 f4 9f c1 d1 d8 be 00 20 f3 e0 86 68 1e c7 f2 c1 a9 f1 bf 69 cc 26 e5 57 f2 79 b9 b9 8b 69 e7 d2 31 e1 26 d5 f3 d1 12 d1
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 00 00 00 00 00 00 15 36
key_nonce - hexdump(len=32): f4 c0 83 ab a6 90 0d ff 9c 05 10 1b 1d 10 c1 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 3e 22
key_iv - hexdump(len=16): e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 43
key_rsc - hexdump(len=8): 54 35 36 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): c2 77 fa 34 70 04 8e 1c 83 25 f4 9f c1 d1 d8 be
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 15 36 f4 c0 83 ab a6 90 0d ff 9c 05 10 1b 1d 10 c1 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 3e 22 e6 41 d2 52 49 c9 5b 53 ca 00 c6 5d 23 1d 45 43 54 35 36 00 00 00 00 00 00 00 00 00 00 00 00 00 c2 77 fa 34 70 04 8e 1c 83 25 f4 9f c1 d1 d8 be 00 20 f3 e0 86 68 1e c7 f2 c1 a9 f1 bf 69 cc 26 e5 57 f2 79 b9 b9 8b 69 e7 d2 31 e1 26 d5 f3 d1 12 d1
WPA: RX message 1 of Group Key Handshake from 00:23:08:bc:17:cf (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32).
WPA: RSC - hexdump(len=6): 54 35 36 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 15 36 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e1 95 b2 dd 68 8c ae 4f 60 f2 20 b1 07 c7 1b db 00 00
WPA: Key negotiation completed with 00:23:08:bc:17:cf [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
Removed BSSID 00:23:08:bc:17:cf from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:23:08:bc:17:cf completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface wlan0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_deauthenticate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6


Nun bin ich mit meinem Latein am Ende.
Ich habe meinen Freund Google befragt, habe manpages gewälzt und auch die Suchfunktion benutzt aber nichts davon war erfolgreich.
Daher wende ich mich hoffnungsvoll an euch und bitte um zeitnahe hilfe ;)


MfG

Arne

Content-Key: 154089

Url: https://administrator.de/contentid/154089

Ausgedruckt am: 29.03.2024 um 10:03 Uhr