Notificación

Planning your return to office strategy? See how ChromeOS can help.

Entender los registros de solicitudes HTTP

Cómo se conecta un dispositivo a una red Wi-Fi

Paso 5: El dispositivo se conecta a un servicio

Por una política de Shill, el dispositivo se conecta automáticamente al servicio 0. Si el usuario elige conectarse a otra red Wi-Fi, es posible que se seleccione otro número de servicio.

Registros

  • En wpa_supplicant se define la prioridad de las redes. Si una red es más conveniente (por su política de seguridad, la intensidad de la señal, etc.), puedes aumentar su valor de prioridad. El valor de grupo de prioridad de Chrome no cambia; en los registros siempre aparece como grupo de prioridad 0.

localhost shill: [0815/104606:INFO:service.cc(255)] Auto-connecting to service 0

localhost shill: [0815/104606:INFO:service.cc(271)] Connect to service 0: AutoConnect

localhost wpa_supplicant[1111]: nl80211: Received scan results (100 BSSes)

localhost wpa_supplicant[1111]: wlan0: BSS: Start scan result update 65

localhost wpa_supplicant[1111]: wlan0: Selecting BSS from priority group 0

localhost wpa_supplicant[1111]: wlan0: 0: 74:44:01:71:cf:91 ssid='Network4' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-46

localhost wpa_supplicant[1111]: wlan0: skip - SSID mismatch

localhost wpa_supplicant[1111]: wlan0: 1: 00:24:6c:db:e4:d0 ssid='Network5' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-64

localhost wpa_supplicant[1111]: wlan0: skip - SSID mismatch

localhost wpa_supplicant[1111]: wlan0: 2: 00:24:6c:db:e4:d2 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-64

localhost wpa_supplicant[1111]: wlan0: skip - SSID not known

localhost wpa_supplicant[1111]: wlan0: 3: 00:24:6c:60:f2:d2 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-64

localhost wpa_supplicant[1111]: wlan0: skip - SSID not known

localhost wpa_supplicant[1111]: wlan0: 4: 00:24:6c:e2:c0:30 ssid='Network5' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-62

localhost wpa_supplicant[1111]: wlan0: skip - SSID mismatch

localhost wpa_supplicant[1111]: wlan0: 5: 00:24:6c:e2:c0:32 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-61

localhost wpa_supplicant[1111]: wlan0: skip - SSID not known

localhost wpa_supplicant[1111]: wlan0: 6: 00:24:6c:db:c4:52 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-65

localhost wpa_supplicant[1111]: wlan0: skip - SSID not known

localhost wpa_supplicant[1111]: wlan0: 7: 00:24:6c:60:f2:d0 ssid='Network5' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-65

localhost wpa_supplicant[1111]: wlan0: skip - SSID mismatch

localhost wpa_supplicant[1111]: wlan0: 8: 00:24:6c:db:cc:70 ssid='Network5' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-67

localhost wpa_supplicant[1111]: wlan0: skip - SSID mismatch

localhost wpa_supplicant[1111]: wlan0: 9: 00:24:6c:db:c4:50 ssid='Network5' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-66

localhost wpa_supplicant[1111]: wlan0: skip - SSID mismatch

localhost wpa_supplicant[1111]: wlan0: 10: 00:24:6c:db:cc:72 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-68

localhost wpa_supplicant[1111]: wlan0: skip - SSID not known

localhost wpa_supplicant[1111]: wlan0: 11: 00:24:6c:60:e3:90 ssid='Network5' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-68

localhost wpa_supplicant[1111]: wlan0: skip - SSID mismatch

localhost wpa_supplicant[1111]: wlan0: 12: 00:24:6c:64:b1:b2 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-68

localhost wpa_supplicant[1111]: wlan0: skip - SSID not known

localhost wpa_supplicant[1111]: wlan0: 13: b0:c7:45:6b:b1:97 ssid='Network1' wpa_ie_len=26 rsn_ie_len=24 caps=0x411 level=-37 wps

localhost wpa_supplicant[1111]: wlan0: selected based on RSN IE

localhost wpa_supplicant[1111]: wlan0: selected BSS b0:c7:45:6b:b1:97 ssid='Network1'

localhost wpa_supplicant[1111]: wlan0: Request association: reassociate: 1 selected: b0:c7:45:6b:b1:97 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: INACTIVE

Paso 6: El dispositivo efectúa la autenticación

wpa_supplicant inicia la fase de autenticación en el dispositivo. Shill sigue supervisando el estado.

Registros

localhost wpa_supplicant[1111]: wlan0: SME: Trying to authenticate with b0:c7:45:6b:b1:97 (SSID='BUFFALO-6BB197' freq=2422 MHz)

localhost wpa_supplicant[1111]: wlan0: No keys have been configured - skip key clearing

localhost wpa_supplicant[1111]: wlan0: State: INACTIVE -> AUTHENTICATING

localhost wpa_supplicant[1111]: EAPOL: External notification - EAP success=0

localhost wpa_supplicant[1111]: EAPOL: Supplicant port status: Unauthorized

localhost wpa_supplicant[1111]: EAPOL: External notification - EAP fail=0

localhost wpa_supplicant[1111]: EAPOL: Supplicant port status: Unauthorized

localhost wpa_supplicant[1111]: EAPOL: External notification - portControl=Auto

localhost wpa_supplicant[1111]: EAPOL: Supplicant port status: Unauthorized

localhost wpa_supplicant[1111]: nl80211: Authenticate (ifindex=2)

localhost wpa_supplicant[1111]: * bssid=b0:c7:45:6b:b1:97

localhost wpa_supplicant[1111]: * freq=2422

localhost wpa_supplicant[1111]: * SSID - hexdump(len=14): 42 55 46 46 41 4c 4f 2d 36 42 42 31 39 37

localhost wpa_supplicant[1111]: * IEs - hexdump(len=0): [NULL]

localhost wpa_supplicant[1111]: * Auth Type 0

localhost wpa_supplicant[1111]: nl80211: Authentication request send successfully

localhost wpa_supplicant[1111]: wlan0: Fast associate: Connect initiated!

localhost shill: [0815/104606:VERBOSE2:wifi.cc(1758)] WiFi wlan0 setting pending service to 0

localhost wpa_supplicant[1111]: nl80211: Event message available

localhost wpa_supplicant[1111]: nl80211: New station b0:c7:45:6b:b1:97

localhost wpa_supplicant[1111]: nl80211: Event message available

localhost wpa_supplicant[1111]: nl80211: MLME event 37

localhost wpa_supplicant[1111]: nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 9c d2 1e 60 3b 71 b0 c7 45 6b b1 97 b0 c7 45 6b b1 97 40 76 00 00 02 00 00 00

localhost wpa_supplicant[1111]: wlan0: Event AUTH (11) received

localhost wpa_supplicant[1111]: wlan0: SME: Authentication response: peer=b0:c7:45:6b:b1:97 auth_type=0 status_code=0

Paso 7: El dispositivo efectúa la asociación

wpa_supplicant pasa a la fase de asociación. Si la asociación se lleva a cabo correctamente, el dispositivo podrá enviar tramas de datos de 802.11.

Registros

localhost shill: [0815/104606:INFO:service.cc(343)] Service 0: state Idle -> Associating

localhost wpa_supplicant[1111]: wlan0: Trying to associate with b0:c7:45:6b:b1:97 (SSID='Network1' freq=2422 MHz)

localhost wpa_supplicant[1111]: wlan0: State: AUTHENTICATING -> ASSOCIATING

localhost wpa_supplicant[1111]: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)

localhost wpa_supplicant[1111]: netlink: Operstate: linkmode=-1, operstate=5

localhost shill: [0815/104606:VERBOSE2:wifi_endpoint.cc(96)] PropertiesChanged

localhost wpa_supplicant[1111]: WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00

localhost wpa_supplicant[1111]: nl80211: Associate (ifindex=2)

localhost wpa_supplicant[1111]: * bssid=b0:c7:45:6b:b1:97

localhost wpa_supplicant[1111]: * freq=2422

localhost wpa_supplicant[1111]: * SSID - hexdump(len=14): 42 55 46 46 41 4c 4f 2d 36 42 42 31 39 37

localhost wpa_supplicant[1111]: * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00

localhost wpa_supplicant[1111]: * pairwise=0xfac04

localhost wpa_supplicant[1111]: * group=0xfac02

localhost wpa_supplicant[1111]: * prev_bssid=b0:c7:45:6b:b1:97

localhost wpa_supplicant[1111]: nl80211: Association request send successfully

localhost shill: [0815/104607:INFO:service.cc(264)] Suppressed autoconnect to service 0 (connecting)

localhost shill: [0815/104607:INFO:wifi.cc(1404)] WiFi wlan0 StateChanged inactive -> authenticating

localhost shill: [0815/104607:INFO:wifi.cc(1404)] WiFi wlan0 StateChanged authenticating -> associating

localhost wpa_supplicant[1111]: nl80211: Event message available

localhost wpa_supplicant[1111]: nl80211: MLME event 38

localhost wpa_supplicant[1111]: nl80211: MLME event frame - hexdump(len=124): 30 00 3a 01 9c d2 1e 60 3b 71 b0 c7 45 6b b1 97 b0 c7 45 6b b1 97 50 76 11 04 00 00 01 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a cc 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 03 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00

localhost wpa_supplicant[1111]: wlan0: Event ASSOC (0) received

localhost wpa_supplicant[1111]: wlan0: Association info event

localhost wpa_supplicant[1111]: resp_ies - hexdump(len=94): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a cc 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 03 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00

localhost wpa_supplicant[1111]: WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=28): 2d 1a cc 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00

localhost wpa_supplicant[1111]: WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=24): 3d 16 03 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

localhost wpa_supplicant[1111]: wlan0: freq=2422 MHz

localhost wpa_supplicant[1111]: wlan0: State: ASSOCIATING -> ASSOCIATED

localhost wpa_supplicant[1111]: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)

localhost wpa_supplicant[1111]: netlink: Operstate: linkmode=-1, operstate=5

localhost wpa_supplicant[1111]: wlan0: Associated to a new BSS: BSSID=b0:c7:45:6b:b1:97

localhost wpa_supplicant[1111]: Add randomness: count=455 entropy=123

localhost wpa_supplicant[1111]: wlan0: No keys have been configured - skip key clearing

localhost wpa_supplicant[1111]: wlan0: Associated with b0:c7:45:6b:b1:97

localhost wpa_supplicant[1111]: wlan0: WPA: Association event - clear replay counter

localhost wpa_supplicant[1111]: wlan0: WPA: Clear old PTK

localhost wpa_supplicant[1111]: TDLS: Remove peers on association

localhost wpa_supplicant[1111]: nl80211: Disabling high bitrates

localhost wpa_supplicant[1111]: EAPOL: External notification - portEnabled=0

localhost wpa_supplicant[1111]: EAPOL: Supplicant port status: Unauthorized

localhost wpa_supplicant[1111]: EAPOL: External notification - portValid=0

localhost wpa_supplicant[1111]: EAPOL: Supplicant port status: Unauthorized

localhost wpa_supplicant[1111]: EAPOL: External notification - EAP success=0

localhost wpa_supplicant[1111]: EAPOL: Supplicant port status: Unauthorized

localhost wpa_supplicant[1111]: EAPOL: External notification - portEnabled=1

localhost wpa_supplicant[1111]: EAPOL: SUPP_PAE entering state CONNECTING

localhost wpa_supplicant[1111]: EAPOL: enable timer tick

localhost wpa_supplicant[1111]: EAPOL: SUPP_BE entering state IDLE

localhost wpa_supplicant[1111]: wlan0: Setting authentication timeout: 10 sec 0 usec

localhost wpa_supplicant[1111]: wlan0: Cancelling scan request

localhost wpa_supplicant[1111]: nl80211: Event message available

localhost wpa_supplicant[1111]: nl80211: Ignore connect event (cmd=46) when using userspace SME

localhost shill: [0815/104607:INFO:wifi.cc(1404)] WiFi wlan0 StateChanged associating -> associated

localhost wpa_supplicant[1111]: wlan0: Setting authentication timeout: 10 sec 0 usec

localhost wpa_supplicant[1111]: wlan0: IEEE 802.1X RX: version=1 type=3 length=95

localhost wpa_supplicant[1111]: wlan0: EAPOL-Key type=2

localhost wpa_supplicant[1111]: wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)

localhost wpa_supplicant[1111]: wlan0: key_length=16 key_data_length=0

localhost wpa_supplicant[1111]: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02

localhost wpa_supplicant[1111]: key_nonce - hexdump(len=32): 6b b6 64 5d 77 ab 39 b9 56 dd a0 1d 8b 6d db df 63 87 f4 b7 c5 69 10 e9 44 18 56 5a d1 b0 18 8e

localhost wpa_supplicant[1111]: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

localhost wpa_supplicant[1111]: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00

localhost wpa_supplicant[1111]: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00

localhost wpa_supplicant[1111]: key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

localhost wpa_supplicant[1111]: WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 6b b6 64 5d 77 ab 39 b9 56 dd a0 1d 8b 6d db df 63 87 f4 b7 c5 69 10 e9 44 18 56 5a d1 b0 18 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

Paso 8: Se establece el protocolo de handshake de 4 vías entre el dispositivo y el punto de acceso

Para crear una clave de encriptado de datos mediante la clave compartida (clave maestra de pares o PMK), wpa_supplicant establece el protocolo de handshake de 4 vías entre el dispositivo y el punto de acceso.  Si el dispositivo se conecta a una red de Protocolo de autenticación extensible (EAP) 802.1X, tendrá que pasar primero el proceso de autenticación de EAP.

Registros

localhost wpa_supplicant[1111]: wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE

localhost wpa_supplicant[1111]: wlan0: WPA: RX message 1 of 4-Way Handshake from b0:c7:45:6b:b1:97 (ver=2)

localhost wpa_supplicant[1111]: RSN: msg 1/4 key data - hexdump(len=0):

localhost wpa_supplicant[1111]: Get randomness: len=32 entropy=124

localhost wpa_supplicant[1111]: WPA: Renewed SNonce - hexdump(len=32): 43 c9 43 60 12 eb 50 b4 a3 0d 3b a8 1d 0b e4 ea 22 bf 9e 28 b6 54 a5 c4 e7 27 29 2e ce 32 d3 0d

localhost wpa_supplicant[1111]: WPA: PTK derivation - A1=9c:d2:1e:60:3b:71 A2=b0:c7:45:6b:b1:97

localhost wpa_supplicant[1111]: WPA: Nonce1 - hexdump(len=32): 43 c9 43 60 12 eb 50 b4 a3 0d 3b a8 1d 0b e4 ea 22 bf 9e 28 b6 54 a5 c4 e7 27 29 2e ce 32 d3 0d

localhost wpa_supplicant[1111]: WPA: Nonce2 - hexdump(len=32): 6b b6 64 5d 77 ab 39 b9 56 dd a0 1d 8b 6d db df 63 87 f4 b7 c5 69 10 e9 44 18 56 5a d1 b0 18 8e

localhost wpa_supplicant[1111]: WPA: PMK - hexdump(len=32): [REMOVED]

localhost wpa_supplicant[1111]: WPA: PTK - hexdump(len=48): [REMOVED]

localhost wpa_supplicant[1111]: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00

localhost wpa_supplicant[1111]: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02

localhost wpa_supplicant[1111]: wlan0: WPA: Sending EAPOL-Key 2/4

localhost wpa_supplicant[1111]: WPA: KCK - hexdump(len=16): [REMOVED]

localhost wpa_supplicant[1111]: WPA: Derived Key MIC - hexdump(len=16): 05 11 6f 30 dd 6b 41 fa e8 eb 37 80 2c d0 96 81

localhost wpa_supplicant[1111]: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 43 c9 43 60 12 eb 50 b4 a3 0d 3b a8 1d 0b e4 ea 22 bf 9e 28 b6 54 a5 c4 e7 27 29 2e ce 32 d3 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 05 11 6f 30 dd 6b 41 fa e8 eb 37 80 2c d0 96 81 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00

localhost wpa_supplicant[1111]: wlan0: RX EAPOL from b0:c7:45:6b:b1:97

localhost wpa_supplicant[1111]: RX EAPOL - hexdump(len=203): 01 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 03 6b b6 64 5d 77 ab 39 b9 56 dd a0 1d 8b 6d db df 63 87 f4 b7 c5 69 10 e9 44 18 56 5a d1 b0 18 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a1 b0 ec da ac 0b 94 d9 59 a5 7b f2 23 31 dc 17 00 68 3c 33 b7 ae 71 37 aa 4c c3 fa 56 ee 9b a4 e8 37 ae 09 30 b1 1c f4 e5 86 3b c3 0b 33 3d 62 00 d0 53 93 a8 56 9a 71 f1 de 5e e5 17 4d 61 86 f1 8d e9 ed 10 43 96 0f e3 a3 1f c4 aa 13 35 5f bb 7b ed b1 97 ea 54 3b 1f c9 40 8b 00 ed 81 67 54 c9 c3 da ec 70 84 c0 24 4d 7d 8d 09 2b cd 1b f9 39 5f d7 0d f5 c1 3c b8 b2

localhost wpa_supplicant[1111]: wlan0: IEEE 802.1X RX: version=1 type=3 length=199

localhost wpa_supplicant[1111]: wlan0: EAPOL-Key type=2

localhost wpa_supplicant[1111]: wlan0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)

localhost wpa_supplicant[1111]: wlan0: key_length=16 key_data_length=104

localhost wpa_supplicant[1111]: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03

localhost wpa_supplicant[1111]: key_nonce - hexdump(len=32): 6b b6 64 5d 77 ab 39 b9 56 dd a0 1d 8b 6d db df 63 87 f4 b7 c5 69 10 e9 44 18 56 5a d1 b0 18 8e

localhost wpa_supplicant[1111]: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

localhost wpa_supplicant[1111]: key_rsc - hexdump(len=8): 2f 00 00 00 00 00 00 00

localhost wpa_supplicant[1111]: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00

localhost wpa_supplicant[1111]: key_mic - hexdump(len=16): a1 b0 ec da ac 0b 94 d9 59 a5 7b f2 23 31 dc 17

localhost wpa_supplicant[1111]: WPA: RX EAPOL-Key - hexdump(len=203): 01 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 03 6b b6 64 5d 77 ab 39 b9 56 dd a0 1d 8b 6d db df 63 87 f4 b7 c5 69 10 e9 44 18 56 5a d1 b0 18 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a1 b0 ec da ac 0b 94 d9 59 a5 7b f2 23 31 dc 17 00 68 3c 33 b7 ae 71 37 aa 4c c3 fa 56 ee 9b a4 e8 37 ae 09 30 b1 1c f4 e5 86 3b c3 0b 33 3d 62 00 d0 53 93 a8 56 9a 71 f1 de 5e e5 17 4d 61 86 f1 8d e9 ed 10 43 96 0f e3 a3 1f c4 aa 13 35 5f bb 7b ed b1 97 ea 54 3b 1f c9 40 8b 00 ed 81 67 54 c9 c3 da ec 70 84 c0 24 4d 7d 8d 09 2b cd 1b f9 39 5f d7 0d f5 c1 3c b8 b2

localhost wpa_supplicant[1111]: RSN: encrypted key data - hexdump(len=104): 3c 33 b7 ae 71 37 aa 4c c3 fa 56 ee 9b a4 e8 37 ae 09 30 b1 1c f4 e5 86 3b c3 0b 33 3d 62 00 d0 53 93 a8 56 9a 71 f1 de 5e e5 17 4d 61 86 f1 8d e9 ed 10 43 96 0f e3 a3 1f c4 aa 13 35 5f bb 7b ed b1 97 ea 54 3b 1f c9 40 8b 00 ed 81 67 54 c9 c3 da ec 70 84 c0 24 4d 7d 8d 09 2b cd 1b f9 39 5f d7 0d f5 c1 3c b8 b2

localhost wpa_supplicant[1111]: WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED]

localhost wpa_supplicant[1111]: wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE

localhost wpa_supplicant[1111]: wlan0: WPA: RX message 3 of 4-Way Handshake from b0:c7:45:6b:b1:97 (ver=2)

localhost wpa_supplicant[1111]: WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 f0 ce 7d c3 13 cd 27 6c bc 51 a0 d0 f0 b4 6e 2d dc a2 b5 45 ab 51 ee 3c 34 88 a6 d4 7a a6 44 4c dd 00

localhost wpa_supplicant[1111]: WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00

localhost wpa_supplicant[1111]: WPA: WPA IE in EAPOL-Key - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02

localhost wpa_supplicant[1111]: WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED]

localhost wpa_supplicant[1111]: wlan0: WPA: Sending EAPOL-Key 4/4

localhost wpa_supplicant[1111]: WPA: KCK - hexdump(len=16): [REMOVED]

localhost wpa_supplicant[1111]: WPA: Derived Key MIC - hexdump(len=16): fc db eb 52 d9 af 39 a7 aa e5 81 29 02 7c 24 52

localhost wpa_supplicant[1111]: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc db eb 52 d9 af 39 a7 aa e5 81 29 02 7c 24 52 00 00

localhost wpa_supplicant[1111]: wlan0: WPA: Installing PTK to the driver

localhost wpa_supplicant[1111]: wpa_driver_nl80211_set_key: ifindex=2 alg=3 addr=0x7f50cb798e88 key_idx=0 set_tx=1 seq_len=6 key_len=16

localhost wpa_supplicant[1111]: addr=b0:c7:45:6b:b1:97

localhost wpa_supplicant[1111]: EAPOL: External notification - portValid=1

Paso 9: Se establece el protocolo de handshake de claves de grupo entre el dispositivo y el punto de acceso

Para que el dispositivo pueda recibir mensajes de multidifusión o difusión cifrados, wpa_supplicant establece el protocolo de handshake de claves de grupo entre el dispositivo y el punto de acceso.  El punto de acceso envía una clave transitoria de grupo (GTK) al dispositivo y este la acepta.

Registros

localhost wpa_supplicant[1111]: wlan0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE

localhost wpa_supplicant[1111]: RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]

localhost wpa_supplicant[1111]: WPA: Group Key - hexdump(len=32): [REMOVED]

localhost wpa_supplicant[1111]: wlan0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32)

localhost wpa_supplicant[1111]: WPA: RSC - hexdump(len=6): 2f 00 00 00 00 00

localhost wpa_supplicant[1111]: wpa_driver_nl80211_set_key: ifindex=2 alg=2 addr=0x7f50caf03c24 key_idx=2 set_tx=0 seq_len=6 key_len=32

localhost wpa_supplicant[1111]: broadcast key

localhost wpa_supplicant[1111]: wlan0: WPA: Key negotiation completed with b0:c7:45:6b:b1:97 [PTK=CCMP GTK=TKIP]

localhost wpa_supplicant[1111]: wlan0: Cancelling authentication timeout

localhost wpa_supplicant[1111]: wlan0: State: GROUP_HANDSHAKE -> COMPLETE

Paso 10: El dispositivo configura el DHCP

Después, se configura el DHCP. La primera vez que el dispositivo se conecta a una red, envía un mensaje DHCP DISCOVER a su subred. El servidor DHCP ofrece una dirección IP al dispositivo. Este hace una petición formal de la dirección IP con el mensaje DHCP REQUEST. El servidor DHCP acusa recibo de la petición con el mensaje DHCP ACKNOWLEDGE. Entonces, el dispositivo modifica su configuración para usar esa IP.

Configuración DHCP

Registros

  • Se ha establecido conexión con la Wi-Fi. Para ver la línea, usa CTRL-EVENT-CONNECTED.
  • El servicio Shill tiene que recibir los datos de su IP del servidor DHCP. El estado de Wi-Fi de Shill se cambia a "completada". El estado del servicio Shill se cambia a "configurando".
  • El servicio DHCP se inicializa con el identificador de proceso (pid) 14295.
  • En los registros se indica el identificador de la transacción (xid) DHCP 0x63526f44.
  • Además de proporcionar la dirección IP del dispositivo, el servidor DHCP ofrece más información (la dirección IP de la pasarela y datos del servidor de nombres de dominio o DNS, por ejemplo). Dicha información se muestra en las líneas con Processing Keys.
  • Cuando el dispositivo recibe la dirección IP, la registra como la pasarela predeterminada en su tabla de reenvío de IP. No obstante, primero tiene que resolver la dirección MAC de la pasarela a partir de la dirección IP mediante el protocolo de resolución de direcciones (ARP).

localhost wpa_supplicant[1111]: wlan0: State: GROUP_HANDSHAKE -> COMPLETED

localhost wpa_supplicant[1111]: wlan0: CTRL-EVENT-CONNECTED - Connection to b0:c7:45:6b:b1:97 completed (reauth) [id=0 id_str=]

localhost shill: [0815/104607:INFO:wifi.cc(1404)] WiFi wlan0 StateChanged associated -> completed

localhost shill: [0815/104607:INFO:service.cc(343)] Service 0: state Associating -> Configuring

localhost dhcpcd[14295]: dhcpcd is running with reduced privileges localhost dhcpcd[14295]: version 5.1.4 starting

localhost dhcpcd[14295]: status changed to Init localhost shill: [0815/104607:VERBOSE2:dhcpcd_proxy.cc(88)] sender(:1.170) pid(14295)

localhost shill: [0815/104607:VERBOSE2:dhcp_provider.cc(72)] GetConfig pid: 14295

localhost shill: [0815/104607:INFO:dhcp_config.cc(160)] Init DHCP Proxy: wlan0 at :1.170

localhost dhcpcd[14295]: wlan0: broadcasting for a lease

localhost dhcpcd[14295]: wlan0: sending DHCP_DISCOVER (xid 0x63526f44), next in 4.61 seconds

localhost shill: [0815/104607:VERBOSE2:dhcpcd_proxy.cc(102)] DHCPCDProxy(service=:1.170).

localhost dhcpcd[14295]: wlan0: received DHCP_OFFER with xid 0x63526f44

localhost dhcpcd[14295]: wlan0: offered 192.168.11.26 from 192.168.11.1

localhost dhcpcd[14295]: wlan0: requesting lease of 192.168.11.26

localhost dhcpcd[14295]: wlan0: sending DHCP_REQUEST (xid 0x63526f44), next in 3.68 seconds

localhost dhcpcd[14295]: wlan0: received DHCP_ACK with xid 0x63526f44

localhost dhcpcd[14295]: wlan0: acknowledged 192.168.11.26 from 192.168.11.1

localhost dhcpcd[14295]: wlan0: checking for 192.168.11.1

localhost dhcpcd[14295]: wlan0: gateway 192.168.11.1 found at b0:c7:45:6b:b1:97

localhost dhcpcd[14295]: wlan0: leased 192.168.11.26 for 86400 seconds

localhost dhcpcd[14295]: event BOUND on interface wlan0

localhost shill: [0815/104607:VERBOSE2:dhcpcd_proxy.cc(48)] sender(:1.170) pid(14295)

localhost shill: [0815/104607:VERBOSE2:dhcp_provider.cc(72)] GetConfig pid: 14295

localhost shill: [0815/104607:INFO:dhcp_config.cc(167)] Event reason: BOUND

localhost shill: [0815/104607:VERBOSE2:dhcp_config.cc(399)] ParseConfiguration

localhost shill: [0815/104607:VERBOSE2:dhcp_config.cc(408)] Processing key: BroadcastAddress

localhost shill: [0815/104607:VERBOSE2:dhcp_config.cc(408)] Processing key: DHCPLeaseTime

localhost shill: [0815/104607:VERBOSE2:dhcp_config.cc(408)] Processing key: DHCPMessageType

localhost shill: [0815/104607:VERBOSE2:dhcp_config.cc(462)] Key ignored.

localhost shill: [0815/104607:VERBOSE2:dhcp_config.cc(408)] Processing key: DHCPRebindingTime

localhost shill: [0815/104607:VERBOSE2:dhcp_config.cc(462)] Key ignored. localhost shill: [0815/104607:VERBOSE2:dhcp_config.cc(408)] Processing key: DHCPRenewalTime

localhost shill: [0815/104607:VERBOSE2:dhcp_config.cc(462)] Key ignored.

localhost shill: [0815/104607:VERBOSE2:dhcp_config.cc(408)] Processing key: DHCPServerIdentifier

localhost shill: [0815/104607:VERBOSE2:dhcp_config.cc(462)] Key ignored.

localhost shill: [0815/104607:VERBOSE2:dhcp_config.cc(408)] Processing key: DomainName

localhost shill: [0815/104607:VERBOSE2:dhcp_config.cc(408)] Processing key: DomainNameServers

localhost shill: [0815/104607:VERBOSE2:dhcp_config.cc(408)] Processing key: IPAddress

localhost shill: [0815/104607:VERBOSE2:dhcp_config.cc(408)] Processing key: NetworkNumber

localhost shill: [0815/104607:VERBOSE2:dhcp_config.cc(462)] Key ignored.

localhost shill: [0815/104607:VERBOSE2:dhcp_config.cc(408)] Processing key: Routers

localhost shill: [0815/104607:VERBOSE2:dhcp_config.cc(408)] Processing key: SubnetCIDR

localhost shill: [0815/104607:VERBOSE2:dhcp_config.cc(408)] Processing key: SubnetMask

localhost shill: [0815/104607:VERBOSE2:dhcp_config.cc(462)] Key ignored.

localhost shill: [0815/104607:VERBOSE2:dhcp_config.cc(537)] StartExpirationTimeout: wlan0: Lease timeout is 86400 seconds.

localhost shill: [0815/104607:VERBOSE2:device.cc(539)] OnIPConfigUpdated

localhost shill: [0815/104607:VERBOSE2:device.cc(652)] CreateConnection

localhost shill: [0815/104607:INFO:connection.cc(168)] UpdateFromIPConfig: Installing with parameters: local=192.168.11.26 broadcast=192.168.11.255 peer= gateway=192.168.11.1

localhost shill: [0815/104607:INFO:service.cc(343)] Service 0: state Configuring -> Connected

¿Te resultó útil esto?

¿Cómo podemos mejorarla?
Búsqueda
Borrar búsqueda
Cerrar búsqueda
Menú principal
9589876048708083395
true
Buscar en el Centro de asistencia
true
true
true
true
true
410864
false
false