Howto:How to Read WLAN Traces on IP72: Difference between revisions

From innovaphone wiki
Jump to navigation Jump to search
Line 64: Line 64:
When done, interrupt the command by hitting CTLR-C. The trace is stored to file log.txt.
When done, interrupt the command by hitting CTLR-C. The trace is stored to file log.txt.


== Analyse the cryptic output ==
== Analyse the cryptic output (initial Association and Authentication) ==


Repeated configuration:
Repeated configuration:

Revision as of 20:19, 19 November 2009

Activate WLAN Tracing with V8

WLAN tracing is activated by navigating to Diagnostics submenu, Tracing, and activating the WLAN checkbox.

Wlan-trace-1.png

It can also be activated by invoking

config add WLANMGR0 /xtrace
config write
reset

Deactivate trace with

config rem WLANMGR0 /xtrace
config write
reset

Activate WLAN Tracing with V7

From the command line:

activate WLAN trace with
config add WLANMGR0 /xtrace
config change ASCDEBUG0 /enable supp /enable wlan
config write
reset

Deactivate trace with

config rem WLANMGR0 /xtrace
config change ASCDEBUG0
config write
config activate

Fetching trace by HTTP

Activate WLAN trace and click on "Trace (continuous)".

Wlan-trace-1.png

Fetching trace by USB

Download USB utilities from http://download.innovaphone.com/. IP72.zip contains the IP72 USB driver (usbio.sys) and the usbload utility (usbload.exe). Place the IP72 in the USB cradle and ,ake sure IP72 is correctly recognized and installed by Windows OS. Activate WLAN Trace as described above.

Alternatively, if there is still no WLAN connection to the IP72, one can activate it through usbload:

>usbload
usbload 1.5 [09-60034]
user: admin
password: ****
$

Activate WLAN trace:

config add WLANMGR0 /xtrace
config change ASCDEBUG0 /enable supp /enable wlan
config write
reset

After reboot start continuous trace by invoking:

usbload login 
usbload clog /file log.txt

When done, interrupt the command by hitting CTLR-C. The trace is stored to file log.txt.

Analyse the cryptic output (initial Association and Authentication)

Repeated configuration:

0:0000:821:5 - HEXDUMP
               00000000 - 43 99 99 94  39 99 99 43  98 99 94 39  98            C...9..C...9.   
0:0000:821:5 - wlan_mgr config: (trpz,4)(AES-CCMP,43999994399999439999943666,1[1-4])(wpa2,none)->(2,WPA2,NONE,,)
               (passwordd,,)(uapsd,long-doze->long-doze)(0->world) (-70dBm)

Intial setup, powermode, regdoamin, channel-mask

0:0000:821:6 - wlan_mgr: powermode state -> s:0 (long-doze)
0:0000:821:7 - wlan_mgr config: regdomain: vars 1, config 1
0:0000:821:7 - wlan_mgr config: channel mask: vars 0x421, config 0x421

Initial setup, config WLAN Auth.

0:0000:926:7 - [WLAN] Updating WLAN driver security parameters;
0:0000:927:0 - [WLAN]    Setting Authentication mode to WPA2
0:0000:927:0 - [WLAN]    Setting Encryption to AES-CCMP
0:0000:927:1 - [WLAN]    Setting passphrase **************
0:0000:927:1 - [WLAN]    Setting EssId trpz
0:0000:927:1 - [WLAN]            EssId length = 4

Start joining the WLAN network:

0:0002:200:5 - [WLAN] here HAL_CTRL  , INIT:   whal_hwCtrl_StartJoin: Enable Tx, Rx and Start the Bss
0:0002:200:6 - [WLAN] here HAL_CTRL  , INIT:   ------------------------------------------------------------
0:0002:200:7 - [WLAN] here HAL_CTRL  , INIT:   START/JOIN, SSID=trpz, BSSID=00-0B-0E-55-67-80, Chan=11
0:0002:201:0 - [WLAN] here HAL_CTRL  , INIT:   ------------------------------------------------------------

Periodic scan results:

0:0002:204:6 - wlan_mgr::serial_event IPC_EVENT_SCAN_COMPLETE
0:0002:205:4 - wlan_mgr: BSSID list-items=5 pending-reqs=0
0:0002:205:5 - wlan_mgr: AP  0:(mac=00:0b:0e:55:32:00, ssid=trpz, rssi=-64dBm, channel=1)(beacon=100ms)(ATIM=0)
0:0002:205:6 - wlan_mgr: AP  1:(mac=00:0f:f8:58:cd:07, ssid=dev, rssi=-67dBm, channel=6)(beacon=100ms)(ATIM=0)
0:0002:205:7 - wlan_mgr: AP  2:(mac=00:0b:0e:55:67:80, ssid=trpz, rssi=-59dBm, channel=11)(beacon=100ms)(ATIM=0)
0:0002:206:0 - wlan_mgr: AP  3:(mac=00:0b:0e:55:69:40, ssid=trpz, rssi=-88dBm, channel=6)(beacon=100ms)(ATIM=0)
0:0002:206:0 - wlan_mgr: AP  4:(mac=00:15:e9:0b:a6:bc, ssid=KatziL, rssi=-91dBm, channel=6)(beacon=100ms)(ATIM=0)

We have been associated, own MAC, MAC from AP.

0:0002:219:5 - [WLAN] Received ASSOCIATED event
0:0002:219:5 - [WLAN] nAssociationMode = 3
0:0002:219:6 - [WLAN] nAuthenticationType = 0
0:0002:219:6 - [WLAN] nKeyType = 1
0:0002:219:6 - [WLAN] nEncryptionType = 3
0:0002:219:7 - [WLAN] Mac Address of STA = 00:01:3e:10:22:b5
0:0002:220:0 - [WLAN] Mac Address of AP = 00:0b:0e:55:67:80

Received a beacon:

0:0002:220:4 - [SUPP] SUPP_SetNetworkInfo
0:0002:220:5 - [SUPP]    00000000: 00 04 74 72 70 7A 01 09 16 8C 12 18 24 30 48 60   ..trpz......$0H`
0:0002:220:5 - [SUPP]    00000010: 6C 02 05 00 00 00 00 01 03 01 0B 30 18 01 00 00   l..........0....
0:0002:220:6 - [SUPP]    00000020: 0F AC 02 02 00 00 0F AC 02 00 0F AC 04 01 00 00   ................
0:0002:220:6 - [SUPP]    00000030: 0F AC 02 00 00 DD 1C 00 50 F2 01 01 00 00 50 F2   ........P.....P.
0:0002:220:7 - [SUPP]    00000040: 02 02 00 00 50 F2 02 00 50 F2 04 01 00 00 50 F2   ....P...P.....P.
0:0002:220:7 - [SUPP]    00000050: 02 00 00 DD 18 00 50 F2 02 01 01 01 68 03 A4 00   ......P.....h...
0:0002:221:0 - [SUPP]    00000060: 00 27 A4 00 00 42 43 5E 00 62 32 2F 00            .'...BC^.b2/.   
0:0002:221:7 - [SUPP] From Suppl: ODSTK_CB_LINK_STATUS
0:0002:222:0 - [SUPP] Link state = Unauthenticated key wait

Received EAPOL (ANonce, Msg1) from AP:

0:0002:238:3 - [WLAN] Received EAPOL event (size = 135)
0:0002:238:3 - [SUPP] SUPP_RecvEAPOL
0:0002:238:5 - [SUPP] [NRM] Received EAPOL packet
0:0002:238:6 - [SUPP]    00000000: 01 03 00 75 02 00 8A 00 10 00 00 00 00 00 00 00   ...u............
0:0002:238:6 - [SUPP]    00000010: 00 F8 7E 0C D3 D6 22 DA 5D A9 63 5B 39 51 8A 19   ..~...".].c[9Q..
0:0002:238:7 - [SUPP]    00000020: ED E8 63 7D ED D2 8B 45 5E 95 8A 0C 29 FD ED BF   ..c}...E^...)...
0:0002:239:0 - [SUPP]    00000030: CC 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0:0002:239:0 - [SUPP]    00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0:0002:239:1 - [SUPP]    00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0:0002:239:1 - [SUPP]    00000060: 00 00 16 DD 14 00 0F AC 04 5F 04 6A C0 08 0B 64   ........._.j...d
0:0002:239:2 - [SUPP]    00000070: 30 85 23 99 B9 41 3B DE EF                        0.#..A;..       

Calculate and transmit EAPOL (Snonce+MIC) to AP:

0:0002:242:5 - [SUPP] [NRM] Sending EAPOL-Key 4-way handshake message 2
0:0002:243:1 - [SUPP] [NRM] Transmitting EAPOL-Key
0:0002:243:1 - [SUPP]    00000000: 01 03 00 75 02 01 0A 00 10 00 00 00 00 00 00 00   ...u............
0:0002:243:2 - [SUPP]    00000010: 00 D5 D4 28 43 21 70 AA 13 77 0E 1F 74 AA 50 6F   ...(C!p..w..t.Po
0:0002:243:2 - [SUPP]    00000020: 80 3B 8D F5 13 D5 94 FA 71 C4 C0 B5 B4 75 F6 7D   .;......q....u.}
0:0002:243:3 - [SUPP]    00000030: 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0:0002:243:3 - [SUPP]    00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0:0002:243:4 - [SUPP]    00000050: 00 A4 15 BE 0A 1B 58 65 41 46 E4 EF FE 02 15 C2   ......XeAF......
0:0002:243:4 - [SUPP]    00000060: BE 00 16 30 14 01 00 00 0F AC 02 01 00 00 0F AC   ...0............
0:0002:243:5 - [SUPP]    00000070: 04 01 00 00 0F AC 02 00 00                        .........       

Receive EAPOL (GTK+MIC) from AP:

0:0002:253:2 - [SUPP] [NRM] Received EAPOL packet
0:0002:253:2 - [SUPP]    00000000: 01 03 00 AF 02 13 CA 00 10 00 00 00 00 00 00 00   ................
0:0002:253:3 - [SUPP]    00000010: 01 F8 7E 0C D3 D6 22 DA 5D A9 63 5B 39 51 8A 19   ..~...".].c[9Q..
0:0002:253:4 - [SUPP]    00000020: ED E8 63 7D ED D2 8B 45 5E 95 8A 0C 29 FD ED BF   ..c}...E^...)...
0:0002:253:4 - [SUPP]    00000030: CC 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0:0002:253:5 - [SUPP]    00000040: 00 8A 19 82 01 00 00 00 00 00 00 00 00 00 00 00   ................
0:0002:253:5 - [SUPP]    00000050: 00 3F 91 D8 81 D9 E6 4A A0 07 1D 0D D2 1A 4A 85   .?.....J......J.
0:0002:253:6 - [SUPP]    00000060: F6 00 50 1D 89 D3 2A DB ED E6 70 A0 E6 F9 84 3C   ..P...*...p....<
0:0002:253:6 - [SUPP]    00000070: 5C 08 47 5A 89 16 59 79 EE 85 86 B0 14 25 F2 C6   \.GZ..Yy.....%..
0:0002:253:7 - [SUPP]    00000080: 65 CF 4C 36 07 25 EC 1B A9 44 8D BC 74 A0 81 F7   e.L6.%...D..t...
0:0002:253:7 - [SUPP]    00000090: 43 BA 06 19 65 13 42 E2 3D B4 AD A0 B4 CC 6F DD   C...e.B.=.....o.
0:0002:254:0 - [SUPP] [NRM] Processing EAPOL-Key message
0:0002:254:1 - [SUPP] [DTL] Received replay counter is 0000000000000001
0:0002:254:2 - [SUPP] [DTL] EAPOL-Key message version = 2
0:0002:254:2 - [SUPP] [NRM] Processing EAPOL-Key 4-way handshake message 3


Send EAPOL (ACK) to AP:

0:0002:257:7 - [SUPP] [NRM] Sending EAPOL-Key 4-way handshake message 4
0:0002:258:2 - [SUPP] [NRM] Transmitting EAPOL-Key
0:0002:258:2 - [SUPP]    00000000: 01 03 00 5F 02 03 0A 00 10 00 00 00 00 00 00 00   ..._............
0:0002:258:3 - [SUPP]    00000010: 01 D5 D4 28 43 21 70 AA 13 77 0E 1F 74 AA 50 6F   ...(C!p..w..t.Po
0:0002:258:3 - [SUPP]    00000020: 80 3B 8D F5 13 D5 94 FA 71 C4 C0 B5 B4 75 F6 7D   .;......q....u.}
0:0002:258:4 - [SUPP]    00000030: 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0:0002:258:4 - [SUPP]    00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0:0002:258:5 - [SUPP]    00000050: 00 04 A3 78 65 FE D2 AE 33 BA 90 B3 F8 AE 29 E8   ...xe...3.....).
0:0002:258:5 - [SUPP]    00000060: B0 00 00                                          ...

Finalize:

0:0002:259:7 - [SUPP] [NRM] Instantiating WPA key, index E0000000, RSC = 0000000000000000
0:0002:259:7 - [SUPP]    00000000: 7A 88 55 AE 19 8C 86 07 DA 04 0C 3A 62 80 BF 79   z.U........:b..y
0:0002:260:0 - [SUPP] From Suppl: ODSTK_CB_ADD_KEY
0:0002:260:1 - [WLAN] here os_setKey OsContext=0x106a5384, keylength=16
0:0002:260:6 - [SUPP] [NRM] Instantiating WPA key, index 20000001, RSC = 000000000182198A
0:0002:260:7 - [SUPP]    00000000: B5 06 BC 63 81 35 F0 F5 BC D8 32 B2 42 BE F1 52   ...c.5....2.B..R
0:0002:260:7 - [SUPP]    00000010: D2 70 F3 F6 E7 3D AC B8 0B A9 04 71 B8 81 43 85   .p...=.....q..C.
0:0002:261:0 - [SUPP] From Suppl: ODSTK_CB_ADD_KEY
0:0002:261:1 - [WLAN] here os_setKey OsContext=0x106a5384, keylength=32
0:0002:261:7 - [WLAN] SendEvent: Queue Event to myself
0:0002:262:3 - [SUPP] From Suppl: ODSTK_CB_LINK_STATUS
0:0002:262:4 - [SUPP] Link state = Open/unauthenticated
0:0002:262:4 - [SUPP] From Suppl: ODSTK_CB_MEDIA_CONNECT