how to get device name by mac address using shell? - shell

I want to get the device name by mac address, using shell. For example, mac="ec:f4:bb:e1:0c:1d", and the original string is like this:
[root#yf-mos-test-net09 ~]# ip link show
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: eth2: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN mode DEFAULT qlen 1000
link/ether ec:f4:bb:e1:0c:1c brd ff:ff:ff:ff:ff:ff
3: eth3: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN mode DEFAULT qlen 1000
link/ether ec:f4:bb:e1:0c:1d brd ff:ff:ff:ff:ff:ff
6: bond0: <BROADCAST,MULTICAST,MASTER> mtu 1500 qdisc noqueue state DOWN mode DEFAULT
link/ether 1a:e5:33:75:83:f2 brd ff:ff:ff:ff:ff:ff
7: bond1: <BROADCAST,MULTICAST,MASTER,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP mode DEFAULT
link/ether 8e:cd:30:03:ea:54 brd ff:ff:ff:ff:ff:ff
923: enp1s16: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 1500 qdisc mq master bond1 state UP mode DEFAULT qlen 1000
link/ether 8e:cd:30:03:ea:54 brd ff:ff:ff:ff:ff:ff
924: enp1s16f1: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 1500 qdisc mq master bond1 state UP mode DEFAULT qlen 1000
link/ether 8e:cd:30:03:ea:54 brd ff:ff:ff:ff:ff:ff
973: ovs-netdev: <BROADCAST,PROMISC> mtu 1500 qdisc noop state DOWN mode DEFAULT qlen 500
link/ether aa:21:35:c1:92:a4 brd ff:ff:ff:ff:ff:ff
974: bradm: <BROADCAST,PROMISC,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UNKNOWN mode DEFAULT qlen 500
link/ether c2:15:a9:8b:db:40 brd ff:ff:ff:ff:ff:ff
976: br_t: <BROADCAST,PROMISC> mtu 1500 qdisc noop state DOWN mode DEFAULT qlen 500
link/ether ec:f4:bb:e1:0c:18 brd ff:ff:ff:ff:ff:ff
977: brpri: <BROADCAST,PROMISC,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UNKNOWN mode DEFAULT qlen 500
link/ether 82:f9:07:9d:d0:45 brd ff:ff:ff:ff:ff:ff
978: breip: <BROADCAST,PROMISC,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UNKNOWN mode DEFAULT qlen 500
link/ether 0e:7b:96:6b:22:4c brd ff:ff:ff:ff:ff:ff
If I use python, I could use re.split(), but I don't know how to do in shell, thank you~

On CentOS 7:
$ source /etc/sysconfig/network-scripts/network-functions && get_device_by_hwaddr 12:34:56:9d:5b:0a
ens160
Source for get_device_by_hwaddr() function:
$ grep get_device_by_hwaddr -A 3 /etc/sysconfig/network-scripts/network-functions
get_device_by_hwaddr ()
{
LANG=C ip -o link | awk -F ': ' -vIGNORECASE=1 '!/link\/ieee802\.11/ && /'"$1"'/ { print $2 }'
}

Related

Ping specific IP range is not working in Mac

I have edit my /etc/hosts file as below. I am new to mac Os and try to run some codes and test. for that i have to edit /etc/hosts file. But ping for IPs not working as expected. please help me to understand the issue.
# Host Database
#
# localhost is used to configure the loopback interface
# when the system is booting. Do not change this entry.
##
127.0.0.1 localhost
255.255.255.255 broadcasthost
::1 localhost
127.0.0.1 198.18.0.98
127.0.0.1 70.70.70.70
127.0.0.1 nipuna.lk
# Added by Docker Desktop
# To allow the same kube context to work on the host and the container:
127.0.0.1 kubernetes.docker.internal
# End of section
ping nipuna.lk works fine. ping 70.70.70.70 takes 300-400ms but ping works. but ping 198.18.0.98 is not working. I do not know why this is happening.
My firewall is turned off.
macOs Big Sur
version 11.2.3 (20D91)
ifconfig
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
options=1203<RXCSUM,TXCSUM,TXSTATUS,SW_TIMESTAMP>
inet 127.0.0.1 netmask 0xff000000
inet6 ::1 prefixlen 128
inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1
nd6 options=201<PERFORMNUD,DAD>
gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280
stf0: flags=0<> mtu 1280
en5: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
ether ac:de:48:00:11:22
inet6 fe80::aede:48ff:fe00:1122%en5 prefixlen 64 scopeid 0x4
nd6 options=201<PERFORMNUD,DAD>
media: autoselect (100baseTX <full-duplex>)
status: active
ap1: flags=8802<BROADCAST,SIMPLEX,MULTICAST> mtu 1500
options=400<CHANNEL_IO>
ether aa:e9:fe:87:df:7a
media: autoselect
status: inactive
en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
options=400<CHANNEL_IO>
ether 88:e9:fe:87:df:7a
inet6 fe80::808:35e:834f:b528%en0 prefixlen 64 secured scopeid 0x6
inet 192.168.1.4 netmask 0xffffff00 broadcast 192.168.1.255
nd6 options=201<PERFORMNUD,DAD>
media: autoselect
status: active
awdl0: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
options=400<CHANNEL_IO>
ether 9e:68:c9:36:de:63
inet6 fe80::9c68:c9ff:fe36:de63%awdl0 prefixlen 64 scopeid 0x7
nd6 options=201<PERFORMNUD,DAD>
media: autoselect
status: active
llw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
options=400<CHANNEL_IO>
ether 9e:68:c9:36:de:63
inet6 fe80::9c68:c9ff:fe36:de63%llw0 prefixlen 64 scopeid 0x8
nd6 options=201<PERFORMNUD,DAD>
media: autoselect
status: active
en1: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
options=460<TSO4,TSO6,CHANNEL_IO>
ether 82:23:8d:28:44:01
media: autoselect <full-duplex>
status: inactive
en2: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
options=460<TSO4,TSO6,CHANNEL_IO>
ether 82:23:8d:28:44:00
media: autoselect <full-duplex>
status: inactive
en3: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
options=460<TSO4,TSO6,CHANNEL_IO>
ether 82:23:8d:28:44:05
media: autoselect <full-duplex>
status: inactive
en4: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
options=460<TSO4,TSO6,CHANNEL_IO>
ether 82:23:8d:28:44:04
media: autoselect <full-duplex>
status: inactive
bridge0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
options=63<RXCSUM,TXCSUM,TSO4,TSO6>
ether 82:23:8d:28:44:01
Configuration:
id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0
maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200
root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0
ipfilter disabled flags 0x0
member: en1 flags=3<LEARNING,DISCOVER>
ifmaxaddr 0 port 9 priority 0 path cost 0
member: en2 flags=3<LEARNING,DISCOVER>
ifmaxaddr 0 port 10 priority 0 path cost 0
member: en3 flags=3<LEARNING,DISCOVER>
ifmaxaddr 0 port 11 priority 0 path cost 0
member: en4 flags=3<LEARNING,DISCOVER>
ifmaxaddr 0 port 12 priority 0 path cost 0
nd6 options=201<PERFORMNUD,DAD>
media: <unknown type>
status: inactive
utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380
inet6 fe80::22d9:6676:ea11:6a32%utun0 prefixlen 64 scopeid 0xe
nd6 options=201<PERFORMNUD,DAD>
utun1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 2000
inet6 fe80::fbf9:4cfd:3512:fa43%utun1 prefixlen 64 scopeid 0xf
nd6 options=201<PERFORMNUD,DAD>

NTP Server Not Working showing init on centos

I am trying to configure ntp server on centos 7 instead of ip address its showing INIT while executing ntpq -p command.
my ntp server configuration file.
/etc/ntp.conf
driftfile /var/lib/ntp/drift
restrict default nomodify notrap nopeer noquery
restrict 127.0.0.1
restrict ::1
# Hosts on local network are less restricted.
Allow 10.0.3.0/24 network clients to syncronize time with this server
restrict 10.0.3.0 mask 255.255.255.0 nomodify notrap
# Use public servers from the pool.ntp.org project.
# Please consider joining the pool (http://www.pool.ntp.org/join.html).
server 2.in.pool.ntp.org
server 1.asia.pool.ntp.org
server 3.asia.pool.ntp.org
includefile /etc/ntp/crypto/pw
keys /etc/ntp/keys
disable monitor
I have have following outputs while executing ntpq -q command
[centos#ip-10-0-3-53 etc]$ ntpq -p
remote refid st t when poll reach delay offset jitter
==============================================================================
ntp.your.org .INIT. 16 u - 128 0 0.000 0.000 0.000
ns3.weiszhostin .INIT. 16 u - 128 0 0.000 0.000 0.000
resolver2.skyfi .INIT. 16 u - 128 0 0.000 0.000 0.000
ntp2.wiktel.com .INIT. 16 u - 128 0 0.000 0.000 0.000
[spryiq#ip-10-0-3-53 etc]$
Port 123 is listening correctly
[centos#ip-10-0-3-53 etc]$ netstat -plnu | grep 123
(Not all processes could be identified, non-owned process info
will not be shown, you would have to be root to see it all.)
udp 0 0 10.0.3.53:123 0.0.0.0:* -
udp 0 0 127.0.0.1:123 0.0.0.0:* -
udp 0 0 0.0.0.0:123 0.0.0.0:* -
udp6 0 0 fe80::10c9:ecff:fe9:123 :::* -
udp6 0 0 ::1:123 :::* -
udp6 0 0 :::123 :::* -
[centos#ip-10-0-3-53 etc]$ ntpstat
timeout
[centos#ip-10-0-3-53 etc]$ ntpq
ntpq> as
ind assid status conf reach auth condition last_event cnt
===========================================================
1 1255 8011 yes no none reject mobilize 1
2 1256 8011 yes no none reject mobilize 1
3 1257 8011 yes no none reject mobilize 1
4 1258 8011 yes no none reject mobilize 1
I have configured iptables correctly.instead of INIT it should display ip addresses How can i troubleshoot this problem??

Vagrant VirtualBox Cisco AnyConnect routing issues with VPN

So I'm having what I believe is a common issue with Cisco AnyConnect and Vagrant/VirtualBox, i'm using host-only networking so that I can stand up a virtual server at an ip such as 10.10.10.11 and then I can map this in my /etc/hosts to :
# IP to hostname mapping
10.10.10.10 vagrant.dev
And then I can pull a webpage from curl vagrant.dev for example. Real standard stuff.
Things go awry when I connect to my work VPN which makes this nice little dev box kind of useless as I can no longer hit it by hostname or ip any longer. I can still do a vagrant ssh to the box but there is no other way to hit it.
I tried taking a look at the routing table and it appears that my pre-vbox route entry (netstat -rn):
Internet:
Destination Gateway Flags Refs Use Netif Expire
PreVPN
10.10.10/24 link#11 UCS 1 0 vboxnet
10.10.10.11 8:0:27:96:91:84 UHLWIi 1 70 vboxnet 1197
PostVPN
10.10.10/24 link#19 UCS 1 0 utun1
10.10.10.11 link#19 UHW3I 0 4 utun1 62
Route Flag Description
|PRE|POST| Flag Description |
|---|----|-----------------------------------------------|
| U | U | Route usable |
| H | H | Host entry (net otherwise) |
| L | | Valid protocol to link address translation |
| W | W | Route was generated as a result of cloning |
| | 3 | Protocol specified route flag #3 |
| I | I | Route is assocaited with an interface scope |
| i | | Route is a holding reference to the interface |
Question
Is it possible to restore the routes changed by VPN in order to make my vagrant connections work again? And if-so how?
Other Data
Full Route Table (PRE) (IP4 only)
Internet:
Destination Gateway Flags Refs Use Netif Expire
default 192.168.2.1 UGSc 23 1 en0
10.10.10/24 link#11 UCS 1 0 vboxnet
10.10.10.11 8:0:27:96:91:84 UHLWIi 1 70 vboxnet 1197
127 127.0.0.1 UCS 0 7 lo0
127.0.0.1 127.0.0.1 UH 11 128344 lo0
169.254 link#4 UCS 0 0 en0
192.168.2 link#4 UCS 0 0 en0
192.168.2.1 68:7f:74:81:8b:b0 UHLSr 27 126 en0
192.168.2.106/32 link#4 UCS 0 0 en0
Full Route Table (POST) (IP4 only)
Internet:
Destination Gateway Flags Refs Use Netif Expire
default link#19 UCS 9 0 utun1
default 192.168.2.1 UGScI 3 0 en0
10.10.10/24 link#19 UCS 1 0 utun1
10.10.10.11 link#19 UHW3I 0 4 utun1 62
17.158.10.25 link#19 UHW3I 0 1 utun1 62
17.158.10.42 link#19 UHW3I 0 20 utun1 62
17.158.10.46 link#19 UHW3I 0 1 utun1 62
127 127.0.0.1 UCS 0 7 lo0
127.0.0.1 127.0.0.1 UH 15 128507 lo0
128.29.154.114 link#19 UHWIi 31 117 utun1
129.83.20.9 link#19 UHW3I 0 20 utun1 61
129.83.26.209 link#19 UHWIi 2 2 utun1
129.83.100.38 link#19 UHW3I 0 46 utun1 62
169.254 link#19 UCS 0 0 utun1
172.31.160/19 link#19 UCS 0 0 utun1
172.31.163.172/32 127.0.0.1 UGSc 3 67 lo0
192.80.55.9/32 192.168.2.1 UGSc 1 0 en0
192.168.2 link#19 UCS 0 0 utun1
192.168.2.1 68:7f:74:81:8b:b0 UHLSr 7 8 en0
192.168.2.1/32 link#19 UCS 0 0 utun1
192.168.2.106/32 link#4 UCS 0 0 en0
216.58.217.132 link#19 UHW3I 0 2 utun1 59
239.255.255.250 link#19 UHmW3I 0 17 utun1 62
Components
OSX
Cisco Any Connect
VirtualBox 5.0.8
Unfortunately there is no fix for the issue, only work-around/help I could think of is after disconnecting the VPN, you could use "route -n add" to establish the connectivity back - at least by this way u could save whole reboot of machines.
Ex:
sudo route -n add -net 192.168.56.0/24 -interface vboxnet0
(Try this after disconnecting from VPN - This method wont work when VPN is on)
In your case, something like, "sudo route -n add -net 10.10.10.0/24 -interface vboxnet0" - depends on your subnet obviously !
Also please see Ticket #14293
When facing this exact same problem what worked for us is to change the address of the Vagrant box to 11.0.0.100

Juniper Network Connect "session terminated unexpectedly" after Mac Yosemite upgrade

Juniper Network Connect is not working since I have upgraded my mac to Yosemite. I have read and followed different forums and related question such as :
https://apple.stackexchange.com/questions/151141/juniper-network-connect-hangs-at-establishing-secure-session-after-upgrading-t
but no luck. Here is the log trace:
2015-06-01 12:59:04.180 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didStartProvisionalLoadForFrame: loading https://ras.optus.com.au/dana-na/auth/url_default/login.cgi... (DSLoginWindowController.m:257)
2015-06-01 12:59:04.181 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didStartProvisionalLoadForFrame: setting cookie <NSHTTPCookie version:0 name:"DSUserAgent" value:"NcWin32" expiresDate:(null) created:2015-06-01 02:59:04 +0000 (4.5482e+08) sessionOnly:TRUE domain:"ras.optus.com.au" path:"/" isSecure:FALSE> (DSLoginWindowController.m:270)
2015-06-01 12:59:04.642 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didFinishLoadForFrame: loaded https://ras.optus.com.au/dana-na/auth/url_default/welcome.cgi?p=user-confirm&id=state_017a96523263fd3962e541d8967f80ae (DSLoginWindowController.m:412)
2015-06-01 12:59:04.642 Network Connect[p492.t4871] DSLoginWindowController.info -clearUserAgentCookie removing cookie <NSHTTPCookie version:0 name:"DSUserAgent" value:"NcWin32" expiresDate:(null) created:2015-06-01 02:59:04 +0000 (4.5482e+08) sessionOnly:TRUE domain:"ras.optus.com.au" path:"/" isSecure:FALSE> (DSLoginWindowController.m:1006)
2015-06-01 12:59:08.819 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didStartProvisionalLoadForFrame: loading https://ras.optus.com.au/dana-na/auth/url_default/login.cgi... (DSLoginWindowController.m:257)
2015-06-01 12:59:08.819 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didStartProvisionalLoadForFrame: setting cookie <NSHTTPCookie version:0 name:"DSUserAgent" value:"NcWin32" expiresDate:(null) created:2015-06-01 02:59:08 +0000 (4.5482e+08) sessionOnly:TRUE domain:"ras.optus.com.au" path:"/" isSecure:FALSE> (DSLoginWindowController.m:270)
2015-06-01 12:59:09.282 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didStartProvisionalLoadForFrame: loading https://ras.optus.com.au/dana-na/html/blank.html... (DSLoginWindowController.m:257)
2015-06-01 12:59:09.283 Network Connect[p492.t4871] DSLoginWindowController.info -clearUserAgentCookie removing cookie <NSHTTPCookie version:0 name:"DSUserAgent" value:"NcWin32" expiresDate:(null) created:2015-06-01 02:59:08 +0000 (4.5482e+08) sessionOnly:TRUE domain:"ras.optus.com.au" path:"/" isSecure:FALSE> (DSLoginWindowController.m:1006)
2015-06-01 12:59:09.284 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didStartProvisionalLoadForFrame: setting cookie <NSHTTPCookie version:0 name:"DSUserAgent" value:"NcWin32" expiresDate:(null) created:2015-06-01 02:59:09 +0000 (4.5482e+08) sessionOnly:TRUE domain:"ras.optus.com.au" path:"/" isSecure:FALSE> (DSLoginWindowController.m:270)
2015-06-01 12:59:09.302 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didFinishLoadForFrame: loaded https://ras.optus.com.au/dana/home/starter.cgi (DSLoginWindowController.m:412)
2015-06-01 12:59:09.303 Network Connect[p492.t4871] DSLoginWindowController.info -clearUserAgentCookie removing cookie <NSHTTPCookie version:0 name:"DSUserAgent" value:"NcWin32" expiresDate:(null) created:2015-06-01 02:59:09 +0000 (4.5482e+08) sessionOnly:TRUE domain:"ras.optus.com.au" path:"/" isSecure:FALSE> (DSLoginWindowController.m:1006)
2015-06-01 12:59:09.303 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didFinishLoadForFrame: found DSID cookie in WebKit cache after page load (DSLoginWindowController.m:435)
2015-06-01 12:59:09.303 Network Connect[p492.t4871] DSSessionContext.info -addCookieWithName:domain:value: Adding cookie with name DSID, domain ras.optus.com.au, and value <hidden> (DSSessionContext.m:81)
2015-06-01 12:59:09.304 Network Connect[p492.t4871] DSSessionContext.info -addCookieWithName:domain:value: Creating a new DSID cookie (DSSessionContext.m:145)
2015-06-01 12:59:09.327 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didStartProvisionalLoadForFrame: loading https://ras.optus.com.au/dana/home/index.cgi... (DSLoginWindowController.m:257)
2015-06-01 12:59:09.327 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didStartProvisionalLoadForFrame: setting cookie <NSHTTPCookie version:0 name:"DSUserAgent" value:"NcWin32" expiresDate:(null) created:2015-06-01 02:59:09 +0000 (4.5482e+08) sessionOnly:TRUE domain:"ras.optus.com.au" path:"/" isSecure:FALSE> (DSLoginWindowController.m:270)
2015-06-01 12:59:09.437 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didFinishLoadForFrame: loaded https://ras.optus.com.au/dana-na/html/blank.html (DSLoginWindowController.m:412)
2015-06-01 12:59:09.438 Network Connect[p492.t4871] DSLoginWindowController.info -clearUserAgentCookie removing cookie <NSHTTPCookie version:0 name:"DSUserAgent" value:"NcWin32" expiresDate:(null) created:2015-06-01 02:59:09 +0000 (4.5482e+08) sessionOnly:TRUE domain:"ras.optus.com.au" path:"/" isSecure:FALSE> (DSLoginWindowController.m:1006)
2015-06-01 12:59:09.443 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didFinishLoadForFrame: found DSID cookie in WebKit cache after page load (DSLoginWindowController.m:435)
2015-06-01 12:59:09.443 Network Connect[p492.t4871] DSSessionContext.info -addCookieWithName:domain:value: Adding cookie with name DSID, domain ras.optus.com.au, and value <hidden> (DSSessionContext.m:81)
2015-06-01 12:59:09.568 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didFinishLoadForFrame: loaded https://ras.optus.com.au/dana/home/index.cgi (DSLoginWindowController.m:412)
2015-06-01 12:59:09.568 Network Connect[p492.t4871] DSLoginWindowController.info -clearUserAgentCookie removing cookie <NSHTTPCookie version:0 name:"DSUserAgent" value:"NcWin32" expiresDate:(null) created:2015-06-01 02:59:09 +0000 (4.5482e+08) sessionOnly:TRUE domain:"ras.optus.com.au" path:"/" isSecure:FALSE> (DSLoginWindowController.m:1006)
2015-06-01 12:59:09.568 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didFinishLoadForFrame: found DSID cookie in WebKit cache after page load (DSLoginWindowController.m:435)
2015-06-01 12:59:09.568 Network Connect[p492.t4871] DSSessionContext.info -addCookieWithName:domain:value: Adding cookie with name DSID, domain ras.optus.com.au, and value <hidden> (DSSessionContext.m:81)
2015-06-01 12:59:09.569 Network Connect[p492.t4871] DSSessionContext.info -addCookieWithName:domain:value: Creating a new DSID cookie (DSSessionContext.m:145)
2015-06-01 12:59:09.569 Network Connect[p492.t4871] NCController.info -loginWindowController:didLoadContents:ofURL: redirecting to https://ras.optus.com.au/dana/nc/ncappletwindow.cgi?param_action=install&url=&w=&win_url=&noapplet=1... (NCController.m:1230)
2015-06-01 12:59:09.570 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didStartProvisionalLoadForFrame: loading https://ras.optus.com.au/dana/nc/ncappletwindow.cgi?param_action=install&url=&w=&win_url=&noapplet=1... (DSLoginWindowController.m:257)
2015-06-01 12:59:09.570 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didStartProvisionalLoadForFrame: setting cookie <NSHTTPCookie version:0 name:"DSUserAgent" value:"NcWin32" expiresDate:(null) created:2015-06-01 02:59:09 +0000 (4.5482e+08) sessionOnly:TRUE domain:"ras.optus.com.au" path:"/" isSecure:FALSE> (DSLoginWindowController.m:270)
2015-06-01 12:59:09.669 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didFinishLoadForFrame: loaded https://ras.optus.com.au/dana/nc/ncappletwindow.cgi?param_action=install&url=&w=&win_url=&noapplet=1 (DSLoginWindowController.m:412)
2015-06-01 12:59:09.669 Network Connect[p492.t4871] DSLoginWindowController.info -clearUserAgentCookie removing cookie <NSHTTPCookie version:0 name:"DSUserAgent" value:"NcWin32" expiresDate:(null) created:2015-06-01 02:59:09 +0000 (4.5482e+08) sessionOnly:TRUE domain:"ras.optus.com.au" path:"/" isSecure:FALSE> (DSLoginWindowController.m:1006)
2015-06-01 12:59:09.670 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didFinishLoadForFrame: found DSID cookie in WebKit cache after page load (DSLoginWindowController.m:435)
2015-06-01 12:59:09.670 Network Connect[p492.t4871] DSSessionContext.info -addCookieWithName:domain:value: Adding cookie with name DSID, domain ras.optus.com.au, and value <hidden> (DSSessionContext.m:81)
2015-06-01 12:59:09.670 Network Connect[p492.t4871] DSSessionContext.info -addCookieWithName:domain:value: Creating a new DSID cookie (DSSessionContext.m:145)
2015-06-01 12:59:09.670 Network Connect[p492.t4871] DSLoginWindowController.info -stopLoadingAndProcessContents:ofURL: processing https://ras.optus.com.au/dana/nc/ncappletwindow.cgi?param_action=install&url=&w=&win_url=&noapplet=1... (DSLoginWindowController.m:463)
2015-06-01 12:59:09.671 Network Connect[p492.t4871] NCController.info -loginWindowController:setClientParameter:value: checking local and remote versions: client 19525 vs. server 19525 (NCController.m:1367)
2015-06-01 12:59:09.671 Network Connect[p492.t4871] NCController.info -loginWindowController:setClientParameter:value: versions are in sync: client 19525 is compatible with IVE 19525; starting session (NCController.m:1388)
2015-06-01 12:59:09.671 Network Connect[p492.t4871] NCController.info -loginWindowController:setClientParameter:value: saving locale preference (
en
) as AppleLanguages for use on next launch. (NCController.m:1344)
2015-06-01 12:59:09.671 Network Connect[p492.t4871] NCWhitelist.info +isAllowAdminListOnlyEnabled Admin whitelist does not exist (NCWhitelist.m:28)
2015-06-01 12:59:09.671 Network Connect[p492.t4871] NCWhitelist.info +checkWhitelist:origin_site: whitelist: /usr/local/juniper/whitelist.txt does not exist (NCWhitelist.m:53)
2015-06-01 12:59:09.671 Network Connect[p492.t4871] NCController.info -enterResolvingProxiesStateWithOldState: reconfiguring and resolving proxies (NCController+NCStateChanges.m:120)
2015-06-01 12:59:09.672 Network Connect[p492.t4871] NCController.info -reconfigure Reconfiguring on en3 (NCController.m:829)
2015-06-01 12:59:09.683 Network Connect[p492.t4871] DSHTTPSProxyResolver.info -resolveProxiesInBackground No HTTPS proxy (DSHTTPSProxyResolver.m:386)
2015-06-01 12:59:09.683 Network Connect[p492.t4871] NCController.info -proxyResolverDidFinishResolving: dnsSuffix = optus.com.au, optusnet.com.au, o-zone.optusnet.com.au, alphawest.com.au, netops.local, count = 0 (NCController.m:1099)
2015-06-01 12:59:09.684 Network Connect[p492.t4871] DSIPCConnection.info -_clearIPCBuffer: Clearing the IPC buffer (DSIPCConnection.mm:526)
2015-06-01 12:59:09.684 Network Connect[p492.t4871] separateserviceadapter.info Adding adapter as responder (NCSeparateServiceAdapter.mm:34)
2015-06-01 12:59:09.685 Network Connect[p492.t4871] NCSeparateServiceAdapter.info Connecting with host ras.optus.com.au (NCServiceAdapter.mm:132)
2015-06-01 12:59:09.700 ncproxyd[p611.t771] ipsec.info New tunnel being created (tunnel.cpp:52)
2015-06-01 12:59:09.707 ncproxyd[p611.t771] routeutils.info Creating Desktop route table iterator (routeutils.cpp:289)
2015-06-01 12:59:09.836 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didFinishLoadForFrame: loaded https://ras.optus.com.au/dana/home/starter0.cgi?check=yes (DSLoginWindowController.m:412)
2015-06-01 12:59:09.840 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didFinishLoadForFrame: found DSID cookie in WebKit cache after page load (DSLoginWindowController.m:435)
2015-06-01 12:59:09.840 Network Connect[p492.t4871] DSSessionContext.info -addCookieWithName:domain:value: Adding cookie with name DSID, domain ras.optus.com.au, and value <hidden> (DSSessionContext.m:81)
2015-06-01 12:59:09.844 Network Connect[p492.t4871] DSSessionContext.info -addCookieWithName:domain:value: Creating a new DSID cookie (DSSessionContext.m:145)
2015-06-01 12:59:09.904 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didStartProvisionalLoadForFrame: loading https://ras.optus.com.au/dana/home/starter0.cgi... (DSLoginWindowController.m:257)
2015-06-01 12:59:09.905 Network Connect[p492.t4871] DSLoginWindowController.info -webView:didStartProvisionalLoadForFrame: setting cookie <NSHTTPCookie version:0 name:"DSUserAgent" value:"NcWin32" expiresDate:(null) created:2015-06-01 02:59:09 +0000 (4.5482e+08) sessionOnly:TRUE domain:"ras.optus.com.au" path:"/" isSecure:FALSE> (DSLoginWindowController.m:270)
2015-06-01 12:59:09.915 Network Connect[p492.t4871] separateserviceadapter.info Removing adapter as responder (NCSeparateServiceAdapter.mm:47)
2015-06-01 12:59:09.915 Network Connect[p492.t4871] separateserviceadapter.info Removing adapter as responder (NCSeparateServiceAdapter.mm:47)
2015-06-01 12:59:09.915 Network Connect[p492.t4871] NCController.info -proxyMonitor:taskDidTerminateWithStatus: /usr/local/juniper/nc/7.1.0/ncproxyd terminated with exit code 11; in state 3; last-signal 0 (NCController.m:1137)
2015-06-01 12:59:09.915 Network Connect[p492.t4871] NCAdminFunctions.info calling ncproxyd to restore system configuration. (NCAdminFunctions.mm:52)
2015-06-01 12:59:09.937 ncproxyd-admintool[p613.t1291] ncproxyd.info looking for ncproxyd in 206 processes (ncproxyd.cpp:241)
2015-06-01 12:59:09.938 ncproxyd-admintool[p613.t1291] ipsec.info New tunnel being created (tunnel.cpp:52)
2015-06-01 12:59:09.944 ncproxyd-admintool[p613.t1291] routeutils.info Creating Desktop route table iterator (routeutils.cpp:289)
2015-06-01 12:59:10.110 Network Connect[p492.t70727] dsclient.info query_str = /dana/home/norefr.cgi?type=NC&action=stop (dsclient.cpp:911)
2015-06-01 12:59:10.115 Network Connect[p492.t70727] DSClientAdapter.info -sendSessionEndMessage Sent session end message (AM_NC/SESSION_STOP). (DSClientAdapter.mm:271)
2015-06-01 12:59:10.115 Network Connect[p492.t70727] DSClientAdapter.info -_threadEntry: Invalidated. Exiting thread. (DSClientAdapter.mm:192)
2015-06-01 12:59:10.182 Network Connect[p492.t4871] nc.mac.app.1203.error <DSError 0xdf783c0 domain=nc.mac.app code=1203 "/usr/local/juniper/nc/7.1.0/ncproxyd terminated with nonzero exit code 11; in state 0" userInfo={
DSErrorClassName = NCController;
DSErrorLocalizedAlertText = "A software error caused the tunneling service to terminate. See the Log Viewer for more information.";
DSErrorLocalizedAlertTitle = "Your session terminated unexpectedly.";
DSErrorLocalizedFirstButtonTitle = Continue;
DSErrorLocalizedSecondButtonTitle = DSOptions;
DSErrorMethodName = "proxyMonitor:taskDidTerminateWithStatus:";
DSErrorStackBackTrace = (
"DSCreateStackBackTraceWithStack (in net.juniper.DSCoreServices) + 111",
"DSFrameArrayWithStackBackTrace (in net.juniper.DSCoreServices) + 2567",
"start (in Network Connect) + 31244",
"start (in Network Connect) + 59928",
"__57-[NSNotificationCenter addObserver:selector:name:object:]_block_invoke (in Foundation) + 50",
"__CFNOTIFICATIONCENTER_IS_CALLING_OUT_TO_AN_OBSERVER__ (in CoreFoundation) + 20",
"_CFXNotificationPost (in CoreFoundation) + 3713",
"-[NSNotificationCenter postNotificationName:object:userInfo:] (in Foundation) + 92",
"__39-[NSConcreteTask launchWithDictionary:]_block_invoke211 (in Foundation) + 168",
"__CFRUNLOOP_IS_CALLING_OUT_TO_A_BLOCK__ (in CoreFoundation) + 16",
"__CFRunLoopDoBlocks (in CoreFoundation) + 195",
"__CFRunLoopRun (in CoreFoundation) + 2165",
"CFRunLoopRunSpecific (in CoreFoundation) + 390",
"CFRunLoopRunInMode (in CoreFoundation) + 123",
"RunCurrentEventLoopInMode (in HIToolbox) + 262",
"ReceiveNextEventCommon (in HIToolbox) + 494",
"_BlockUntilNextEventMatchingListInModeWithFilter (in HIToolbox) + 99",
"_DPSNextEvent (in AppKit) + 742",
"-[NSApplication nextEventMatchingMask:untilDate:inMode:dequeue:] (in AppKit) + 350",
"-[NSApplication run] (in AppKit) + 907",
"NSApplicationMain (in AppKit) + 2082",
"start (in Network Connect) + 57362",
"start (in Network Connect) + 270",
"start (in Network Connect) + 41",
"0x00000001 (in Network Connect)"
);
} (NCController.m:1148)>
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info ifconfig -a: lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info options=3<RXCSUM,TXCSUM>
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info inet6 ::1 prefixlen 128
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info inet 127.0.0.1 netmask 0xff000000
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info nd6 options=1<PERFORMNUD>
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info stf0: flags=0<> mtu 1280
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info en0: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info ether b8:f6:b1:13:cc:11
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info inet6 fe80::baf6:b1ff:fe13:cc11%en0 prefixlen 64 scopeid 0x4
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info inet 169.254.94.100 netmask 0xffff0000 broadcast 169.254.255.255
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info nd6 options=1<PERFORMNUD>
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info media: autoselect
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info status: active
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info en1: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info options=60<TSO4,TSO6>
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info ether 32:00:1a:ce:9c:00
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info media: autoselect <full-duplex>
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info status: inactive
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info en2: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info options=60<TSO4,TSO6>
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info ether 32:00:1a:ce:9c:01
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info media: autoselect <full-duplex>
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info status: inactive
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info en3: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info options=10b<RXCSUM,TXCSUM,VLAN_HWTAGGING,AV>
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info ether 40:6c:8f:39:72:29
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info inet6 fe80::426c:8fff:fe39:7229%en3 prefixlen 64 scopeid 0x7
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info inet 211.29.157.23 netmask 0xffffff80 broadcast 211.29.157.127
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info nd6 options=1<PERFORMNUD>
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info media: autoselect (100baseTX <full-duplex>)
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info status: active
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info bridge0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info options=63<RXCSUM,TXCSUM,TSO4,TSO6>
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info ether ba:f6:b1:31:dd:00
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info Configuration:
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info ipfilter disabled flags 0x2
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info member: en1 flags=3<LEARNING,DISCOVER>
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info ifmaxaddr 0 port 5 priority 0 path cost 0
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info member: en2 flags=3<LEARNING,DISCOVER>
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info ifmaxaddr 0 port 6 priority 0 path cost 0
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info nd6 options=1<PERFORMNUD>
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info media: <unknown type>
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info status: inactive
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info p2p0: flags=8802<BROADCAST,SIMPLEX,MULTICAST> mtu 2304
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info ether 0a:f6:b1:13:cc:11
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info media: autoselect
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info status: inactive
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info awdl0: flags=8902<BROADCAST,PROMISC,SIMPLEX,MULTICAST> mtu 1452
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info ether 86:50:9b:4d:34:8b
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info nd6 options=1<PERFORMNUD>
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info media: autoselect
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info status: inactive
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info bridge100: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info options=3<RXCSUM,TXCSUM>
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info ether ba:f6:b1:31:dd:64
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info inet 192.168.2.1 netmask 0xffffff00 broadcast 192.168.2.255
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info inet6 fe80::b8f6:b1ff:fe31:dd64%bridge100 prefixlen 64 scopeid 0xb
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info Configuration:
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info ipfilter disabled flags 0x2
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info member: en0 flags=3<LEARNING,DISCOVER>
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info ifmaxaddr 0 port 4 priority 0 path cost 0
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info nd6 options=1<PERFORMNUD>
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info media: autoselect
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info status: active
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info netstat -rnf inet: -a: Routing tables
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info Internet:
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info Destination Gateway Flags Refs Use Netif Expire
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info default 211.29.157.1 UGSc 95 221 en3
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info default link#4 UCSI 1 0 en0
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info default link#11 UCSI 0 0 bridge1
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info 10/24 link#5 USc 0 0 en1
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info 10.0.0.56 11.11.11.11.11.11.11.11.11.11.11.1.80.0.5.14.5 UHS 0 0 en1
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info 10.0.0.138 link#5 UHS 0 0 en1
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info 10.105.96.63 link#1 UHS 0 0 lo0
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info 10.105.96.254 ff.ff.ff.ff.ff.0.0.0.0.0.0.0.7c.0.5.14.7.0.0.0.7.0.6.1.3.0.0.0.0.0.0.0.3.8.1.0.0.0.0.0.a6.0.0.0.0.0.0.0.0.0.0.0.dc.5.0.0.0.0.0.0.73.d7.6b.55.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.a6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.10.2.0.0.11.53.fd.7.0.0.0.0.0.0.0.0.10.2.0.0.d3.1d.9d.1.7.0.0.0.0.0.0.0.7c.0.5.14.7.0.0.0.7.0.6.1.3.0.0.0.0.0.0.0.3.8.1.0.0.0.0.0.c5.0.0.0.0.0.0.0.0.0.0.0.dc.5.0.0.0.0.0.0.82.d8.6b.55.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.c5.0.0.0.0.0.0.0.0.0.0.0.b4.5.0.0.0.0.0.0.10.2.0.0.11.6e.f2.9.0.0.0.0.0.0.0.0.10.2.0.0.d3.1d.9d.1.7.0.0 UHS 0 0 en1
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info 127 127.0.0.1 UCS 0 0 lo0
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info 127.0.0.1 127.0.0.1 UH 3 187 lo0
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info 169.254 link#7 UCS 0 0 en3
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info 169.254 link#4 UCSI 0 0 en0
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info 169.254.94.100/32 link#4 UCS 0 0 en0
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info 192.168.2 link#11 UC 1 0 bridge1
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info 192.168.2.2 90.8d.6c.af.ab.d4 UHLWIi 3 52 bridge1 1163
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info 211.29.157/25 link#7 UCS 2 0 en3
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info 211.29.157.1/32 link#7 UCS 1 0 en3
2015-06-01 12:59:10.191 Network Connect[p492.t4871] diag.info 211.29.157.1 0:19:a9:8:74:0 UHLWIir 94 0 en3 915
2015-06-01 12:59:10.192 Network Connect[p492.t4871] diag.info 211.29.157.23/32 link#7 UCS 0 0 en3
2015-06-01 12:59:10.192 Network Connect[p492.t4871] diag.info 211.29.157.104 10:dd:b1:ba:ca:4d UHLWI 0 0 en3 1194
2015-06-01 12:59:10.192 Network Connect[p492.t4871] diag.info 211.29.157.127 ff:ff:ff:ff:ff:ff UHLWbI 0 5 en3
2015-06-01 12:59:10.192 Network Connect[p492.t4871] diag.info resolv.conf: #
2015-06-01 12:59:10.192 Network Connect[p492.t4871] diag.info # Mac OS X Notice
2015-06-01 12:59:10.192 Network Connect[p492.t4871] diag.info #
2015-06-01 12:59:10.192 Network Connect[p492.t4871] diag.info # This file is not used by the host name and address resolution
2015-06-01 12:59:10.192 Network Connect[p492.t4871] diag.info # or the DNS query routing mechanisms used by most processes on
2015-06-01 12:59:10.192 Network Connect[p492.t4871] diag.info # this Mac OS X system.
2015-06-01 12:59:10.192 Network Connect[p492.t4871] diag.info #
2015-06-01 12:59:10.192 Network Connect[p492.t4871] diag.info # This file is automatically generated.

WPA supplicant ERROR WPA: 4-Way Handshake failed in WiFi Direct setup

I am trying to set up WiFi Direct between two linux machines. I am using Atheros 9k cards to set up the connections. We have a problem in the process which I hope you guys can help me.
When I run WPA Supplicant in both of the parts, I get this:
wpa_supplicant -B -D nl80211 -i wlan0 -cp2p.conf -d
wpa_supplicant v2.2-devel
random: Trying to read entropy from /dev/random
Successfully initialized wpa_supplicant
Initializing interface 'wlan0' conf 'p2p.conf' driver 'nl80211' ctrl_interface 'N/A' bridge 'N/A'
Configuration file 'p2p.conf' -> '/root/p2p.conf'
Reading configuration file '/root/p2p.conf'
ctrl_interface='/var/run/wpa_supplicant'
ap_scan=2
update_config=1
device_name='giulia118'
p2p_go_ht40=1
Priority group 0
id=0 ssid='Direct_Network'
nl80211: Could not add multicast membership for vendor events: -2 (No such file or directory)
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:6
nl80211: Using driver-based off-channel TX
nl80211: interface wlan0 in phy phy0
nl80211: Set mode ifindex 4 iftype 2 (STATION)
nl80211: Subscribe to mgmt frames with non-AP handle 0x9fa4380
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=040a
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=040b
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=040c
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=040d
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=090a
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=090b
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=090c
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=090d
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=0409506f9a09
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=7f506f9a09
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=06
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=0a07
nl80211: Register frame type=0xd0 nl_handle=0x9fa4380 match=0a11
netlink: Operstate: ifindex=4 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
nl80211: driver param='(null)'
Add interface wlan0 to a new radio phy0
nl80211: Regulatory information - country=00
nl80211: 2402-2472 # 40 MHz 20 mBm
nl80211: 2457-2482 # 20 MHz 20 mBm (no IR)
nl80211: 2474-2494 # 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 # 40 MHz 20 mBm (no IR)
nl80211: 5735-5835 # 40 MHz 20 mBm (no IR)
nl80211: Added 802.11b mode based on 802.11g information
wlan0: Own MAC address: 04:f0:21:06:1d:14
wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
wlan0: RSN: flushing PMKID list in the driver
nl80211: Flush PMKIDs
wlan0: Setting scan request: 0.100000 sec
wlan0: WPS: UUID based on MAC address: 94f8bf7f-bad8-5fc8-87c2-05c3afbed265
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
P2P: Own listen channel: 6
P2P: Random operating channel: 81:6
P2P: Add operating class 81
P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
P2P: Add operating class 115
P2P: Channels - hexdump(len=4): 24 28 2c 30
P2P: Add operating class 124
P2P: Channels - hexdump(len=4): 95 99 9d a1
P2P: Add operating class 116
P2P: Channels - hexdump(len=2): 24 2c
P2P: Add operating class 117
P2P: Channels - hexdump(len=2): 28 30
P2P: Add operating class 126
P2P: Channels - hexdump(len=2): 95 9d
P2P: Add operating class 127
P2P: Channels - hexdump(len=2): 99 a1
P2P: initialized
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 124:149,153,157,161 116:36,44 117:40,48 126:149,157 127:153,161
P2P: cli_channels:
wlan0: Added interface wlan0
wlan0: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlan0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
Daemonize..
Then I run wpa_cli and I use the commands for create a p2p group in pbc (Pusg button Control), and the final messages of the failed connection are:
1st Device:
<3>WPS-AP-AVAILABLE-PBC
<3>SME: Trying to authenticate with 04:f0:21:06:1d:1f (SSID='DIRECT-Mj' freq=2412 MHz)
<3>Trying to associate with 04:f0:21:06:1d:1f (SSID='DIRECT-Mj' freq=2412 MHz)
<3>Associated with 04:f0:21:06:1d:1f
<3>CTRL-EVENT-EAP-STARTED EAP authentication started
<3>CTRL-EVENT-EAP-STATUS status='started' parameter=''
<3>CTRL-EVENT-EAP-PROPOSED-METHOD vendor=14122 method=1
<3>CTRL-EVENT-EAP-STATUS status='accept proposed method' parameter='WSC'
<3>CTRL-EVENT-EAP-METHOD EAP vendor 14122 method 1 (WSC) selected
<3>WPS-CRED-RECEIVED
<3>WPS-SUCCESS
<3>P2P-GROUP-FORMATION-SUCCESS
<3>CTRL-EVENT-EAP-STATUS status='completion' parameter='failure'
<3>CTRL-EVENT-EAP-FAILURE EAP authentication failed
<3>CTRL-EVENT-DISCONNECTED bssid=04:f0:21:06:1d:1f reason=3 locally_generated=1
<3>SME: Trying to authenticate with 04:f0:21:06:1d:1f (SSID='DIRECT-Mj' freq=2412 MHz)
<3>Trying to associate with 04:f0:21:06:1d:1f (SSID='DIRECT-Mj' freq=2412 MHz)
<3>CTRL-EVENT-REGDOM-CHANGE init=DRIVER type=WORLD
<3>Associated with 04:f0:21:06:1d:1f
<3>CTRL-EVENT-DISCONNECTED bssid=04:f0:21:06:1d:1f reason=2
<3>WPA: 4-Way Handshake failed - pre-shared key may be incorrect
<3>CTRL-EVENT-REGDOM-CHANGE init=DRIVER type=WORLD
<3>CTRL-EVENT-SCAN-STARTED
<3>CTRL-EVENT-SCAN-RESULTS
<3>WPS-AP-AVAILABLE
<3>P2P-GROUP-FORMATION-FAILURE
<3>P2P-GROUP-REMOVED wlan0 client reason=FORMATION_FAILED
2nd Device:
<3>AP-ENABLED
<3>CTRL-EVENT-CONNECTED - Connection to 04:f0:21:06:1d:1f completed [id=1 id_str=]
<3>P2P-GROUP-STARTED wlan0 GO ssid="DIRECT-Mj" freq=2412 passphrase="ZPHbkRAf" go_dev_addr=04:f0:21:06:1d:1f
wps_pbc
> OK
<3>WPS-PBC-ACTIVE
<3>P2P-PROV-DISC-PBC-REQ 04:f0:21:06:1d:14 p2p_dev_addr=04:f0:21:06:1d:14 pri_dev_type=1-0050F204-1 name='giulia118' config_methods=0x108 dev_capab=0x21 group_capab=0x0 group=wlan0
<3>WPS-ENROLLEE-SEEN 04:f0:21:06:1d:14 94f8bf7f-bad8-5fc8-87c2-05c3afbed265 1-0050F204-1 0x2108 4 1 [giulia118]
<3>CTRL-EVENT-EAP-STARTED 04:f0:21:06:1d:14
<3>CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
<3>CTRL-EVENT-EAP-PROPOSED-METHOD vendor=14122 method=254
<3>WPS-REG-SUCCESS 04:f0:21:06:1d:14 94f8bf7f-bad8-5fc8-87c2-05c3afbed265
<3>WPS-PBC-DISABLE
<3>WPS-SUCCESS
<3>CTRL-EVENT-EAP-FAILURE 04:f0:21:06:1d:14
<3>WPS-ENROLLEE-SEEN 04:f0:21:06:1d:14 94f8bf7f-bad8-5fc8-87c2-05c3afbed265 1-0050F204-1 0x2108 0 0 [giulia118]
The content of my configuration (p2p.conf) file is:
1st Device:
ctrl_interface=/var/run/wpa_supplicant
ap_scan=2
fast_reauth=1
update_config=1
device_name=giulia116
device_type=1-0050F204-1
p2p_go_ht40=1
network={
ssid="Direct_Network"
psk="12345678"
proto=RSN WPA
key_mgmt=WPA-PSK
pairwise=CCMP TKIP
group=CCMP TKIP
}
2nd Device:
ctrl_interface=/var/run/wpa_supplicant
ap_scan=2
update_config=1
device_name=giulia118
device_type=1-0050F204-1
p2p_go_ht40=1
network={
ssid="Direct_Network"
psk="12345678"
key_mgmt=WPA-PSK
group=CCMP TKIP
}
ifconfig:
eth0 Link encap:Ethernet HWaddr 00:0d:b9:2e:1b:88
inet addr:192.168.97.116 Bcast:192.168.97.255 Mask:255.255.255.0
inet6 addr: fe80::20d:b9ff:fe2e:1b88/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:2949 errors:0 dropped:0 overruns:0 frame:0
TX packets:1840 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:321032 (321.0 KB) TX bytes:268766 (268.7 KB)
Interrupt:10 Base address:0xe000
eth1 Link encap:Ethernet HWaddr 00:0d:b9:2e:1b:89
inet addr:172.16.0.235 Bcast:172.16.0.255 Mask:255.255.255.0
inet6 addr: fe80::20d:b9ff:fe2e:1b89/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:163951 errors:0 dropped:0 overruns:0 frame:0
TX packets:35 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:17016272 (17.0 MB) TX bytes:4093 (4.0 KB)
Interrupt:15
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 B) TX bytes:0 (0.0 B)
mon.wlan0 Link encap:UNSPEC HWaddr 04-F0-21-06-1D-1F-30-30-00-00-00-00-00-00-00-00
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:716 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:104534 (104.5 KB) TX bytes:0 (0.0 B)
wlan0 Link encap:Ethernet HWaddr 04:f0:21:06:1d:1f
inet6 addr: fe80::6f0:21ff:fe06:1d1f/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:13 errors:0 dropped:0 overruns:0 frame:0
TX packets:6 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:2154 (2.1 KB) TX bytes:576 (576.0 B)
.config :
CONFIG_DRIVER_NL80211=y
CONFIG_READLINE=y
CONFIG_CTRL_IFACE=y
CONFIG_WPS=y
CONFIG_WPS2=y
CONFIG_P2P=y
CONFIG_AP=y
#CONFIG_DRIVER_WEXT=y
#CONFIG_DRIVER_BSD=y
#CONFIG_DRIVER_NDIS=y
CONFIG_IEEE8021X_EAPOL=y
#CONFIG_EAP_MD5=y
#CONFIG_EAP_MSCHAPV2=y
CONFIG_EAP_TLS=y
CONFIG_EAP_PEAP=y
#CONFIG_EAP_TTLS=y
#CONFIG_EAP_GTC=y
#CONFIG_EAP_OTP=y
#CONFIG_EAP_SIM=y
#CONFIG_EAP_AKA=y
CONFIG_EAP_PSK=y
#CONFIG_EAP_SAKE=y
#CONFIG_EAP_GPSK=y
#CONFIG_EAP_PAX=y
CONFIG_EAP_LEAP=y
#CONFIG_EAP_IKEV2=y
#CONFIG_PCSC=y
The error seems to be related to the “4-Way Handshake” failure. Could it be that the pre-shared key is incorrect? Why I have a “GROUP REMOVED” ?
I would appreciate any suggestion regarding the matter.
Thank you all in advance!

Resources