Howto:How to Read WLAN Traces on IP72

From innovaphone wiki
Jump to navigation Jump to search

Applies To

This information applies to

  • IP72

Build V7 and later.

Activate WLAN Tracing with V8

WLAN tracing is activated by navigating to Diagnostics submenu, Tracing, and activating the WLAN checkbox.

Wlan-trace-1.png

It can also be activated by invoking

config add WLANMGR0 /xtrace
config write
reset

Deactivate trace with

config rem WLANMGR0 /xtrace
config write
reset

Activate WLAN Tracing with V7

From the command line:

Activate WLAN trace with

config add WLANMGR0 /xtrace
config change ASCDEBUG0 /enable supp /enable wlan
config write
reset

Deactivate trace with

config rem WLANMGR0 /xtrace
config change ASCDEBUG0
config write
config activate

Fetching trace by HTTP

Activate WLAN trace and click on "Trace (continuous)".

Wlan-trace-1.png

Fetching trace by Wireshark via rpcap

Plese see http://wiki.innovaphone.com/index.php?title=Howto:Pcap for details.

Fetching trace by USB

Download USB utilities from http://download.innovaphone.com/. IP72.zip contains the IP72 USB driver (usbio.sys) and the usbload utility (usbload.exe). Place the IP72 in the USB cradle and ,ake sure IP72 is correctly recognized and installed by Windows OS. Activate WLAN Trace as described above.

Alternatively, if there is still no WLAN connection to the IP72, one can activate it through usbload:

>usbload
usbload 1.5 [09-60034]
user: admin
password: ****
$

Activate WLAN trace:

config add WLANMGR0 /xtrace
config change ASCDEBUG0 /enable supp /enable wlan
config write
reset

After reboot start continuous trace by invoking:

usbload login 
usbload clog /file log.txt

When done, interrupt the command by hitting CTLR-C. The trace is stored to file log.txt.

Analyse the cryptic output (initial Association and Authentication)

Repeated configuration:

0:0000:821:5 - HEXDUMP
               00000000 - 43 99 99 94  39 99 99 43  98 99 94 39  98            C...9..C...9.   
0:0000:821:5 - wlan_mgr config: (trpz,4)(AES-CCMP,43999994399999439999943666,1[1-4])(wpa2,none)->(2,WPA2,NONE,,)
               (passwordd,,)(uapsd,long-doze->long-doze)(0->world) (-70dBm)

Intial setup, powermode, regdoamin, channel-mask

0:0000:821:6 - wlan_mgr: powermode state -> s:0 (long-doze)
0:0000:821:7 - wlan_mgr config: regdomain: vars 1, config 1
0:0000:821:7 - wlan_mgr config: channel mask: vars 0x421, config 0x421

Initial setup, config WLAN Auth.

0:0000:926:7 - [WLAN] Updating WLAN driver security parameters;
0:0000:927:0 - [WLAN]    Setting Authentication mode to WPA2
0:0000:927:0 - [WLAN]    Setting Encryption to AES-CCMP
0:0000:927:1 - [WLAN]    Setting passphrase **************
0:0000:927:1 - [WLAN]    Setting EssId trpz
0:0000:927:1 - [WLAN]            EssId length = 4

Start joining the WLAN network:

0:0002:200:5 - [WLAN] here HAL_CTRL  , INIT:   whal_hwCtrl_StartJoin: Enable Tx, Rx and Start the Bss
0:0002:200:6 - [WLAN] here HAL_CTRL  , INIT:   ------------------------------------------------------------
0:0002:200:7 - [WLAN] here HAL_CTRL  , INIT:   START/JOIN, SSID=trpz, BSSID=00-0B-0E-55-67-80, Chan=11
0:0002:201:0 - [WLAN] here HAL_CTRL  , INIT:   ------------------------------------------------------------

Periodic scan results:

0:0002:204:6 - wlan_mgr::serial_event IPC_EVENT_SCAN_COMPLETE
0:0002:205:4 - wlan_mgr: BSSID list-items=5 pending-reqs=0
0:0002:205:5 - wlan_mgr: AP  0:(mac=00:0b:0e:55:32:00, ssid=trpz, rssi=-64dBm, channel=1)(beacon=100ms)(ATIM=0)
0:0002:205:6 - wlan_mgr: AP  1:(mac=00:0f:f8:58:cd:07, ssid=dev, rssi=-67dBm, channel=6)(beacon=100ms)(ATIM=0)
0:0002:205:7 - wlan_mgr: AP  2:(mac=00:0b:0e:55:67:80, ssid=trpz, rssi=-59dBm, channel=11)(beacon=100ms)(ATIM=0)
0:0002:206:0 - wlan_mgr: AP  3:(mac=00:0b:0e:55:69:40, ssid=trpz, rssi=-88dBm, channel=6)(beacon=100ms)(ATIM=0)
0:0002:206:0 - wlan_mgr: AP  4:(mac=00:15:e9:0b:a6:bc, ssid=KatziL, rssi=-91dBm, channel=6)(beacon=100ms)(ATIM=0)

We have been associated, own MAC, MAC from AP.

0:0002:219:5 - [WLAN] Received ASSOCIATED event
0:0002:219:5 - [WLAN] nAssociationMode = 3
0:0002:219:6 - [WLAN] nAuthenticationType = 0
0:0002:219:6 - [WLAN] nKeyType = 1
0:0002:219:6 - [WLAN] nEncryptionType = 3
0:0002:219:7 - [WLAN] Mac Address of STA = 00:01:3e:10:22:b5
0:0002:220:0 - [WLAN] Mac Address of AP = 00:0b:0e:55:67:80

Received a beacon:

0:0002:220:4 - [SUPP] SUPP_SetNetworkInfo
0:0002:220:5 - [SUPP]    00000000: 00 04 74 72 70 7A 01 09 16 8C 12 18 24 30 48 60   ..trpz......$0H`
0:0002:220:5 - [SUPP]    00000010: 6C 02 05 00 00 00 00 01 03 01 0B 30 18 01 00 00   l..........0....
0:0002:220:6 - [SUPP]    00000020: 0F AC 02 02 00 00 0F AC 02 00 0F AC 04 01 00 00   ................
0:0002:220:6 - [SUPP]    00000030: 0F AC 02 00 00 DD 1C 00 50 F2 01 01 00 00 50 F2   ........P.....P.
0:0002:220:7 - [SUPP]    00000040: 02 02 00 00 50 F2 02 00 50 F2 04 01 00 00 50 F2   ....P...P.....P.
0:0002:220:7 - [SUPP]    00000050: 02 00 00 DD 18 00 50 F2 02 01 01 01 68 03 A4 00   ......P.....h...
0:0002:221:0 - [SUPP]    00000060: 00 27 A4 00 00 42 43 5E 00 62 32 2F 00            .'...BC^.b2/.   
0:0002:221:7 - [SUPP] From Suppl: ODSTK_CB_LINK_STATUS
0:0002:222:0 - [SUPP] Link state = Unauthenticated key wait

Received EAPOL (ANonce, Msg1) from AP:

0:0002:238:3 - [WLAN] Received EAPOL event (size = 135)
0:0002:238:3 - [SUPP] SUPP_RecvEAPOL
0:0002:238:5 - [SUPP] [NRM] Received EAPOL packet
0:0002:238:6 - [SUPP]    00000000: 01 03 00 75 02 00 8A 00 10 00 00 00 00 00 00 00   ...u............
0:0002:238:6 - [SUPP]    00000010: 00 F8 7E 0C D3 D6 22 DA 5D A9 63 5B 39 51 8A 19   ..~...".].c[9Q..
0:0002:238:7 - [SUPP]    00000020: ED E8 63 7D ED D2 8B 45 5E 95 8A 0C 29 FD ED BF   ..c}...E^...)...
0:0002:239:0 - [SUPP]    00000030: CC 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0:0002:239:0 - [SUPP]    00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0:0002:239:1 - [SUPP]    00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0:0002:239:1 - [SUPP]    00000060: 00 00 16 DD 14 00 0F AC 04 5F 04 6A C0 08 0B 64   ........._.j...d
0:0002:239:2 - [SUPP]    00000070: 30 85 23 99 B9 41 3B DE EF                        0.#..A;..       

Calculate and transmit EAPOL (Snonce+MIC) to AP:

0:0002:242:5 - [SUPP] [NRM] Sending EAPOL-Key 4-way handshake message 2
0:0002:243:1 - [SUPP] [NRM] Transmitting EAPOL-Key
0:0002:243:1 - [SUPP]    00000000: 01 03 00 75 02 01 0A 00 10 00 00 00 00 00 00 00   ...u............
0:0002:243:2 - [SUPP]    00000010: 00 D5 D4 28 43 21 70 AA 13 77 0E 1F 74 AA 50 6F   ...(C!p..w..t.Po
0:0002:243:2 - [SUPP]    00000020: 80 3B 8D F5 13 D5 94 FA 71 C4 C0 B5 B4 75 F6 7D   .;......q....u.}
0:0002:243:3 - [SUPP]    00000030: 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0:0002:243:3 - [SUPP]    00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0:0002:243:4 - [SUPP]    00000050: 00 A4 15 BE 0A 1B 58 65 41 46 E4 EF FE 02 15 C2   ......XeAF......
0:0002:243:4 - [SUPP]    00000060: BE 00 16 30 14 01 00 00 0F AC 02 01 00 00 0F AC   ...0............
0:0002:243:5 - [SUPP]    00000070: 04 01 00 00 0F AC 02 00 00                        .........       

Receive EAPOL (GTK+MIC) from AP:

0:0002:253:2 - [SUPP] [NRM] Received EAPOL packet
0:0002:253:2 - [SUPP]    00000000: 01 03 00 AF 02 13 CA 00 10 00 00 00 00 00 00 00   ................
0:0002:253:3 - [SUPP]    00000010: 01 F8 7E 0C D3 D6 22 DA 5D A9 63 5B 39 51 8A 19   ..~...".].c[9Q..
0:0002:253:4 - [SUPP]    00000020: ED E8 63 7D ED D2 8B 45 5E 95 8A 0C 29 FD ED BF   ..c}...E^...)...
0:0002:253:4 - [SUPP]    00000030: CC 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0:0002:253:5 - [SUPP]    00000040: 00 8A 19 82 01 00 00 00 00 00 00 00 00 00 00 00   ................
0:0002:253:5 - [SUPP]    00000050: 00 3F 91 D8 81 D9 E6 4A A0 07 1D 0D D2 1A 4A 85   .?.....J......J.
0:0002:253:6 - [SUPP]    00000060: F6 00 50 1D 89 D3 2A DB ED E6 70 A0 E6 F9 84 3C   ..P...*...p....<
0:0002:253:6 - [SUPP]    00000070: 5C 08 47 5A 89 16 59 79 EE 85 86 B0 14 25 F2 C6   \.GZ..Yy.....%..
0:0002:253:7 - [SUPP]    00000080: 65 CF 4C 36 07 25 EC 1B A9 44 8D BC 74 A0 81 F7   e.L6.%...D..t...
0:0002:253:7 - [SUPP]    00000090: 43 BA 06 19 65 13 42 E2 3D B4 AD A0 B4 CC 6F DD   C...e.B.=.....o.
0:0002:254:0 - [SUPP] [NRM] Processing EAPOL-Key message
0:0002:254:1 - [SUPP] [DTL] Received replay counter is 0000000000000001
0:0002:254:2 - [SUPP] [DTL] EAPOL-Key message version = 2
0:0002:254:2 - [SUPP] [NRM] Processing EAPOL-Key 4-way handshake message 3


Send EAPOL (ACK) to AP:

0:0002:257:7 - [SUPP] [NRM] Sending EAPOL-Key 4-way handshake message 4
0:0002:258:2 - [SUPP] [NRM] Transmitting EAPOL-Key
0:0002:258:2 - [SUPP]    00000000: 01 03 00 5F 02 03 0A 00 10 00 00 00 00 00 00 00   ..._............
0:0002:258:3 - [SUPP]    00000010: 01 D5 D4 28 43 21 70 AA 13 77 0E 1F 74 AA 50 6F   ...(C!p..w..t.Po
0:0002:258:3 - [SUPP]    00000020: 80 3B 8D F5 13 D5 94 FA 71 C4 C0 B5 B4 75 F6 7D   .;......q....u.}
0:0002:258:4 - [SUPP]    00000030: 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0:0002:258:4 - [SUPP]    00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0:0002:258:5 - [SUPP]    00000050: 00 04 A3 78 65 FE D2 AE 33 BA 90 B3 F8 AE 29 E8   ...xe...3.....).
0:0002:258:5 - [SUPP]    00000060: B0 00 00                                          ...

Finalize:

0:0002:259:7 - [SUPP] [NRM] Instantiating WPA key, index E0000000, RSC = 0000000000000000
0:0002:259:7 - [SUPP]    00000000: 7A 88 55 AE 19 8C 86 07 DA 04 0C 3A 62 80 BF 79   z.U........:b..y
0:0002:260:0 - [SUPP] From Suppl: ODSTK_CB_ADD_KEY
0:0002:260:1 - [WLAN] here os_setKey OsContext=0x106a5384, keylength=16
0:0002:260:6 - [SUPP] [NRM] Instantiating WPA key, index 20000001, RSC = 000000000182198A
0:0002:260:7 - [SUPP]    00000000: B5 06 BC 63 81 35 F0 F5 BC D8 32 B2 42 BE F1 52   ...c.5....2.B..R
0:0002:260:7 - [SUPP]    00000010: D2 70 F3 F6 E7 3D AC B8 0B A9 04 71 B8 81 43 85   .p...=.....q..C.
0:0002:261:0 - [SUPP] From Suppl: ODSTK_CB_ADD_KEY
0:0002:261:1 - [WLAN] here os_setKey OsContext=0x106a5384, keylength=32
0:0002:261:7 - [WLAN] SendEvent: Queue Event to myself
0:0002:262:3 - [SUPP] From Suppl: ODSTK_CB_LINK_STATUS
0:0002:262:4 - [SUPP] Link state = Open/unauthenticated
0:0002:262:4 - [SUPP] From Suppl: ODSTK_CB_MEDIA_CONNECT

Analyse cryptic output (Roaming)

Rescan APs, received LOW_RSSI, join AP with better RSSI

21:1808:180:7 - wlan_mgr: BSSID list-items=2 pending-reqs=0
21:1808:181:0 - wlan_mgr: AP *0:(mac=00:0b:0e:55:32:00, ssid=trpz, rssi=-63dBm, channel=1)(beacon=100ms)(ATIM=0)
21:1808:181:1 - wlan_mgr: AP  1:(mac=00:0b:0e:55:67:80, ssid=trpz, rssi=-64dBm, channel=11)(beacon=100ms)(ATIM=0)
21:1810:021:2 - wlan_mgr: RSSI = -66  SNR = 0
21:1811:648:3 - wlan_mgr::serial_event IPC_EVENT_LOW_RSSI
21:1811:976:6 - wlan_mgr: RSSI = -70  SNR = 0
21:1812:010:5 - VOIP_CALL.4 -> PHONE_REG.1 : SIG_MEDIA_INFO xmit(8,43,9,4629) recv(8,8,95,0)
21:1812:010:6 - phone_app: call_update 0035 RECV_MEDIA_INFO
21:1812:011:5 - PHONE_REG.1 -> VOIP_CALL.4 : SIG_FACILITY
21:1812:014:1 - PHONE_APP.0 -> PHONE_APP.0 : APP_DISP_FLUSH
21:1812:158:6 - [WLAN] SendEvent: Queue Event to myself
21:1812:161:5 - [WLAN] here HAL_CTRL  , INIT:   whal_hwCtrl_StartJoin: Enable Tx, Rx and Start the Bss
21:1812:161:6 - [WLAN] here HAL_CTRL  , INIT:   ------------------------------------------------------------
21:1812:162:0 - [WLAN] here HAL_CTRL  , INIT:   START/JOIN, SSID=trpz, BSSID=00-0B-0E-55-67-80, Chan=11
21:1812:162:1 - [WLAN] here HAL_CTRL  , INIT:   ------------------------------------------------------------
21:1812:163:1 - [WLAN] HandleEvent: Event type = 0x13
21:1812:163:1 - [WLAN] Received ROAMING event, buffering tx packets
21:1812:163:3 - [SUPP] Restarting timer 60000 ms
21:1812:167:0 - wlan_mgr::serial_event IPC_EVENT_LOW_RSSI
21:1812:167:0 - wlan_mgr::serial_event IPC_EVENT_ROAMING_START
21:1812:173:4 - [WLAN] Add to SendQPrio (numof packets = 1)
21:1812:174:7 - [WLAN] SendEvent: Queue Event to myself
21:1812:175:4 - [WLAN] HandleEvent: Event type = 0x0
21:1812:175:5 - [WLAN] Received ASSOCIATED event

Then we have the 4-way handshake as described above, followed by

21:1812:223:4 - [SUPP] From Suppl: ODSTK_CB_MEDIA_CONNECT
21:1812:223:4 - [WLAN] Received media connect, stopped buffering
21:1812:223:5 - [WLAN] Send from SendQPrio (left in queue = 0)
21:1812:224:4 - [WLAN] Transmitting gratuitous ARP reply
21:1812:224:5 - [WLAN] Roamed from 00:0b:0e:55:32:00 (-71:1) to 00:0b:0e:55:67:80 (-60:11)

We can calculate approximate roaming time by subtracting the roam-begin and roam-end events:

21:1812:163:1 - [WLAN] Received ROAMING event, buffering tx packets
...
21:1812:224:5 - [WLAN] Roamed from 00:0b:0e:55:32:00 (-71:1) to 00:0b:0e:55:67:80 (-60:11)

Only 61ms. Usual and common roaming sequence lasts for approx. 100ms.

WLAN Managment Frames on Startup

After reboot, the observed message frame sequence on e.g. a Trapeze system looks like this:

IP72 --- Probe Request ---> AP
IP72 <-- Probe Response --- AP
IP72 <---- Beacon --------- AP
IP72 - Auth. (open) ------> AP
IP72 <--- Auth (ok) ------- AP
IP72 -- Assoc. request ---> AP
IP72 <--- Assoc. response - AP
IP72 <--- EAPOL (1) ------- AP
IP72 ---- EAPOL (2) ------> AP
IP72 <--- EAPOL (3) ------- AP
IP72 ---- EAPOL (4) ------> AP

After link layer acivation, IP requetst an IP-addr through DHCP.


WLAN Managment Frames when Roaming

IP72 --- Probe Request ---> AP
IP72 <-- Probe Response --- AP
IP72 <---- Beacon --------- AP
IP72 - Auth. (open) ------> AP
IP72 <--- Auth (ok) ------- AP
IP72 - Reassoc. request --> AP
IP72 <- Reassoc. response - AP
IP72 <--- EAPOL (1) ------- AP
IP72 ---- EAPOL (2) ------> AP
IP72 <--- EAPOL (3) ------- AP
IP72 ---- EAPOL (4) ------> AP

After link layer acivation, IP requetst an IP-addr through DHCP.