On Wednesday, January 30, 2019 1:01 PM, Andrej Shadura <andrew@xxxxxxxxxx> wrote: > On Wed, 30 Jan 2019 at 19:57, Kurt Meyer debbugrpt19015@xxxxxxxxx wrote: > > > wpasupplicant v2:2.7+git20190128+0c1e29f-1 seems to have fixed the issue here. I'm using a Broadcom BCM4352 Wi-Fi card. > > Wow, that’s very good to hear! Diff, have it fixed it for you? Thanks > in advance for testing. > > -- > > Cheers, > Andrej Sadly I can't say the same. Just installed wpasupplicant 2:2.7+git20190128+0c1e29f-1 from the sid repos and it still failed to connect. On Wednesday, January 30, 2019 2:53 PM, Beniamino Galvani <bgalvani@xxxxxxxxxx> wrote: > > Hi, > > Could you please configure a more verbose debug level and paste the > lines related to the IGTK just before "Failed to configure IGTK"? > > Disabling PMF in NetworkManager would probably solve the problem: > > nmcli connection modify 'Depeche Modem' wifi-sec.pmf disable > > but I think it's worth investigating the root cause of the issue. > > Newer NM versions don't set 'ieee80211w=1' but instead use the global > 'Pmf' property, which should work better in cases where the driver > doesn't support PMF. > > Beniamino Beniamino's suggestion did work out great. As far as finding a root cause, I've attached 2 more logs. Probably not the cleanest/easiest way, I stopped the systemd-controlled wpa_supplicant service and started it on the terminal in the foreground, copying the options it had under systemd but swapping -s for -d and -dd. Let me know if you need me to do it a different way, I'd be happy to! Diff
wpa_supplicant v2.8-devel random: getrandom() support available dbus: Register D-Bus object '/fi/w1/wpa_supplicant1' Providing DBus service 'fi.w1.wpa_supplicant1'. Providing DBus service 'fi.epitest.hostap.WPASupplicant'. Successfully initialized wpa_supplicant Override interface parameter: ctrl_interface ('(null)' -> '/run/wpa_supplicant') Initializing interface 'wlp5s0' conf 'N/A' driver 'nl80211,wext' ctrl_interface '/run/wpa_supplicant' bridge 'N/A' nl80211: TDLS supported nl80211: TDLS external setup nl80211: Supported cipher 00-0f-ac:1 nl80211: Supported cipher 00-0f-ac:5 nl80211: Supported cipher 00-0f-ac:2 nl80211: Supported cipher 00-0f-ac:4 nl80211: Supported cipher 00-0f-ac:10 nl80211: Supported cipher 00-0f-ac:8 nl80211: Supported cipher 00-0f-ac:9 nl80211: Supported cipher 00-0f-ac:6 nl80211: Supported cipher 00-0f-ac:13 nl80211: Supported cipher 00-0f-ac:11 nl80211: Supported cipher 00-0f-ac:12 nl80211: Using driver-based off-channel TX nl80211: Driver-advertised extended capabilities (default) - hexdump(len=8): 00 00 00 00 00 00 00 40 nl80211: Driver-advertised extended capabilities mask (default) - hexdump(len=8): 00 00 00 00 00 00 00 40 nl80211: Use separate P2P group interface (driver advertised support) nl80211: interface wlp5s0 in phy phy0 nl80211: Set mode ifindex 3 iftype 2 (STATION) nl80211: Subscribe to mgmt frames with non-AP handle 0x55e7e60381f0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=0104 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=040a nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=040b nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=040c nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=040d nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=090a nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=090b nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=090c nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=090d nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=0409506f9a09 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=7f506f9a09 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=0409506f9a1a nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=0801 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=040e nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=12 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=06 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=0a07 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=0a11 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=0a1a nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=1101 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=1102 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=0505 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55e7e60381f0 match=0500 rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0 netlink: Operstate: ifindex=3 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT) Add interface wlp5s0 to a new radio phy0 nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Own MAC address: f2:37:e2:44:ee:82 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wlp5s0: RSN: flushing PMKID list in the driver nl80211: Flush PMKIDs wlp5s0: State: DISCONNECTED -> INACTIVE TDLS: TDLS operation supported by driver TDLS: Driver uses external link setup TDLS: Driver does not support TDLS channel switching wlp5s0: WPS: UUID based on MAC address: ff5577ee-1bbc-543d-887e-b2898ced4732 ENGINE: Loading dynamic engine ENGINE: Loading dynamic engine EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Own listen channel: 81:11 P2P: Random operating channel: 81:11 P2P: initialized P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: dbus: Register interface object '/fi/w1/wpa_supplicant1/Interfaces/1' wlp5s0: Added interface wlp5s0 wlp5s0: State: INACTIVE -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) wlp5s0: Setting bss expiration age: 250 sec wlp5s0: Setting bss expiration scan count: 2 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) wlp5s0: Add radio work 'scan'@0x55e7e602f170 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55e7e602f170 after 0.000022 second wait wlp5s0: nl80211: scan request Scan requested (ret=0) - scan timeout 10 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000046 seconds EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.621811 seconds nl80211: Received scan results (3 BSSes) wlp5s0: BSS: Start scan result update 1 wlp5s0: BSS: Add new id 0 BSSID d8:b6:b7:ee:fc:18 SSID 'Depeche Modem' freq 2442 dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0' wlp5s0: BSS: Add new id 1 BSSID da:31:34:e1:8b:79 SSID '' freq 2442 dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1' wlp5s0: BSS: Add new id 2 BSSID da:31:34:e1:8b:79 SSID 'DIRECT-roku-866-CE748F' freq 2442 dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2' BSS: last_scan_res_used=3/32 wlp5s0: Scan-only results received wlp5s0: Radio work 'scan'@0x55e7e602f170 done in 3.629213 seconds wlp5s0: radio_work_free('scan'@0x55e7e602f170): num_active_works --> 0 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1002 () nl80211: Interface down (wlp5s0/wlp5s0) wlp5s0: Event INTERFACE_DISABLED (26) received wlp5s0: Interface was disabled nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: BSS: Remove id 0 BSSID d8:b6:b7:ee:fc:18 SSID 'Depeche Modem' due to wpa_bss_flush dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0' wlp5s0: BSS: Remove id 1 BSSID da:31:34:e1:8b:79 SSID '' due to wpa_bss_flush dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1' wlp5s0: BSS: Remove id 2 BSSID da:31:34:e1:8b:79 SSID 'DIRECT-roku-866-CE748F' due to wpa_bss_flush dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2' wlp5s0: State: DISCONNECTED -> INTERFACE_DISABLED wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1002 () l2_packet_receive - recvfrom: Network is down l2_packet_receive - recvfrom: Network is down dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Interface up (wlp5s0/wlp5s0) nl80211: Own MAC address on ifindex 3 (wlp5s0) changed from f2:37:e2:44:ee:82 to 40:e2:30:17:0e:e8 wlp5s0: Event INTERFACE_ENABLED (25) received wlp5s0: Interface was enabled wlp5s0: State: INTERFACE_DISABLED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Setting scan request: 0.000000 sec wlp5s0: No enabled networks - do not scan wlp5s0: State: DISCONNECTED -> INACTIVE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' wlp5s0: Setting scan request: 0.000000 sec wlp5s0: State: INACTIVE -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 11 wlp5s0: Add radio work 'scan'@0x55e7e6075970 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55e7e6075970 after 0.000007 second wait Request driver to clear scan cache due to local BSS flush wlp5s0: nl80211: scan request nl80211: Add NL80211_SCAN_FLAG_FLUSH Scan requested (ret=0) - scan timeout 30 seconds nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000020 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.627101 seconds nl80211: Received scan results (3 BSSes) wlp5s0: BSS: Start scan result update 2 wlp5s0: BSS: Add new id 3 BSSID d8:b6:b7:ee:fc:18 SSID 'Depeche Modem' freq 2442 dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3' wlp5s0: BSS: Add new id 4 BSSID da:31:34:e1:8b:79 SSID '' freq 2442 dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4' wlp5s0: BSS: Add new id 5 BSSID da:31:34:e1:8b:79 SSID 'DIRECT-roku-866-CE748F' freq 2442 dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5' BSS: last_scan_res_used=3/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP[0] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55e7e6075970 done in 3.631770 seconds wlp5s0: radio_work_free('scan'@0x55e7e6075970): num_active_works --> 0 wlp5s0: Scan results matching the currently selected network wlp5s0: 0: d8:b6:b7:ee:fc:18 freq=2442 level=-47 snr=35 est_throughput=135000 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-47 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 1 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55e7e6074d70 current_ssid=0x55e7e6074d70 wlp5s0: Request association with d8:b6:b7:ee:fc:18 TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55e7e6075970 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55e7e6075970 after 0.000035 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=0x55e7e6074d70 try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 03 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found WPA: Renewed SNonce - hexdump(len=32): 66 d8 a1 16 eb 6f 8f 8c e4 d6 c1 56 39 6f 2e dc 0e f1 31 bb 0b fb fa af 22 f7 5a ba 9c 9c 55 09 WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): 66 d8 a1 16 eb 6f 8f 8c e4 d6 c1 56 39 6f 2e dc 0e f1 31 bb 0b fb fa af 22 f7 5a ba 9c 9c 55 09 WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 03 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 33 2a 0f cb 0c 54 28 71 58 b8 50 cc e5 b7 0f 1b dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 03 key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 04 key_rsc - hexdump(len=8): d6 09 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): d7 08 a2 14 ba 23 c2 26 84 fc 56 c6 a9 35 76 a2 WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): 85 10 ea d7 8d 72 2b d3 a3 8b 43 02 fa c1 fd 1d 7d 77 f9 98 fb 7d 6b 0a d8 19 1a 40 2e 62 33 fc 0f 3f 55 f8 73 ba 0a a8 93 7e c5 23 1d 21 a5 d8 24 51 de 06 c2 d4 23 e3 52 0b 34 25 e8 35 6e 57 cd 98 ec 7c 34 4d f3 78 ad 43 c9 7c 9b ce ba 3f 59 22 cc 5c 33 3e 02 a3 WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 42 e7 a9 d5 26 61 71 fc 53 0d 7c bf 07 aa 16 ca wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55e7e60373f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): d6 09 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55e7e55d2909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d6 09 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55e7e6075970 done in 0.051279 seconds wlp5s0: radio_work_free('sme-connect'@0x55e7e6075970): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (3 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 3 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55e7e55d2909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55e7e60354b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 11 wlp5s0: Add radio work 'scan'@0x55e7e60393c0 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55e7e60393c0 after 0.000027 second wait wlp5s0: nl80211: scan request Scan requested (ret=0) - scan timeout 30 seconds nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000077 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.621209 seconds nl80211: Received scan results (3 BSSes) wlp5s0: BSS: Start scan result update 4 BSS: last_scan_res_used=3/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP[0] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55e7e60393c0 done in 3.625706 seconds wlp5s0: radio_work_free('scan'@0x55e7e60393c0): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-54 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 1: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-56 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 2: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-56 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-54 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55e7e6074d70 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55e7e60393c0 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55e7e60393c0 after 0.000021 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 04 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found WPA: Renewed SNonce - hexdump(len=32): 8c 8f 5c ce 44 f8 94 9b 92 aa 62 38 2b d1 e6 98 0e 35 b9 c8 4a f9 89 21 ed 07 c9 38 fa a0 7e 8d WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): 8c 8f 5c ce 44 f8 94 9b 92 aa 62 38 2b d1 e6 98 0e 35 b9 c8 4a f9 89 21 ed 07 c9 38 fa a0 7e 8d WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 04 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): a1 e4 c4 80 a2 ce 28 13 5b cb 3e c8 93 e8 f6 d9 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 04 key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 05 key_rsc - hexdump(len=8): dd 09 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 53 29 cc 64 76 cd ab 76 7c 6b d3 a0 48 50 01 ba WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): 02 b8 9a e7 1a d3 48 9c 3f 6f c7 0a 54 a6 b9 7e 4e b3 6b ec 08 9f 44 98 51 7c 21 41 32 f4 65 f7 73 67 13 f7 69 85 f0 c4 cf d5 aa 1a cf b6 05 34 4a c5 fa 83 4a bf e0 6f d4 87 91 41 78 97 74 a1 3f ca 75 98 7f cc 91 3a 16 64 97 f0 e5 ae 74 0f 1f c0 6a f5 1c 62 41 5a WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): b3 49 54 3a ea 6d cc ed 0a 8a e6 c0 33 7e e2 96 wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55e7e60373f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): dd 09 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55e7e55d2909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): dd 09 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55e7e60393c0 done in 0.064543 seconds wlp5s0: radio_work_free('sme-connect'@0x55e7e60393c0): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (3 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 5 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55e7e55d2909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55e7e60354b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 11 wlp5s0: Add radio work 'scan'@0x55e7e6076980 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55e7e6076980 after 0.000030 second wait wlp5s0: nl80211: scan request Scan requested (ret=0) - scan timeout 30 seconds nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000064 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.635150 seconds nl80211: Received scan results (4 BSSes) wlp5s0: BSS: Start scan result update 6 wlp5s0: BSS: Add new id 6 BSSID ac:b3:13:2b:90:60 SSID 'Diehl' freq 2462 dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6' BSS: last_scan_res_used=4/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP ac:b3:13:2b:90:60 type 0 added WPS: AP[0] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] ac:b3:13:2b:90:60 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55e7e6076980 done in 3.640205 seconds wlp5s0: radio_work_free('scan'@0x55e7e6076980): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-53 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 1: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-56 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 2: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-57 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: 3: ac:b3:13:2b:90:60 ssid='Diehl' wpa_ie_len=0 rsn_ie_len=20 caps=0xc11 level=-79 freq=2462 wps wlp5s0: skip - SSID mismatch wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-53 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55e7e6074d70 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55e7e6076980 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55e7e6076980 after 0.000043 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: MLME event 38; timeout with d8:b6:b7:ee:fc:18 wlp5s0: Event ASSOC_TIMED_OUT (14) received wlp5s0: SME: Association timed out wlp5s0: Radio work 'sme-connect'@0x55e7e6076980 done in 0.667968 seconds wlp5s0: radio_work_free('sme-connect'@0x55e7e6076980): num_active_works --> 0 Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 2 --> request scan in 500 ms wlp5s0: Setting scan request: 0.500000 sec nl80211: Data frame filter flags=0x0 wlp5s0: State: ASSOCIATING -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 11 wlp5s0: Add radio work 'scan'@0x55e7e6076980 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55e7e6076980 after 0.000024 second wait wlp5s0: nl80211: scan request Scan requested (ret=0) - scan timeout 30 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000081 seconds RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.630816 seconds nl80211: Received scan results (4 BSSes) wlp5s0: BSS: Start scan result update 7 BSS: last_scan_res_used=4/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP[0] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] ac:b3:13:2b:90:60 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55e7e6076980 done in 3.638231 seconds wlp5s0: radio_work_free('scan'@0x55e7e6076980): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-46 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 1: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-56 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 2: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-57 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: 3: ac:b3:13:2b:90:60 ssid='Diehl' wpa_ie_len=0 rsn_ie_len=20 caps=0xc11 level=-79 freq=2462 wps wlp5s0: skip - SSID mismatch wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-46 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55e7e6074d70 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55e7e6076980 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55e7e6076980 after 0.000017 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: MLME event 38; timeout with d8:b6:b7:ee:fc:18 wlp5s0: Event ASSOC_TIMED_OUT (14) received wlp5s0: SME: Association timed out wlp5s0: Radio work 'sme-connect'@0x55e7e6076980 done in 0.672743 seconds wlp5s0: radio_work_free('sme-connect'@0x55e7e6076980): num_active_works --> 0 Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 3 --> request scan in 1000 ms wlp5s0: Setting scan request: 1.000000 sec nl80211: Data frame filter flags=0x0 wlp5s0: State: ASSOCIATING -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 11 wlp5s0: Add radio work 'scan'@0x55e7e6076980 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55e7e6076980 after 0.000007 second wait wlp5s0: nl80211: scan request Scan requested (ret=0) - scan timeout 30 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000100 seconds RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.642229 seconds nl80211: Received scan results (4 BSSes) wlp5s0: BSS: Start scan result update 8 BSS: last_scan_res_used=4/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP[0] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] ac:b3:13:2b:90:60 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55e7e6076980 done in 3.649519 seconds wlp5s0: radio_work_free('scan'@0x55e7e6076980): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-31 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 1: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-34 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: 2: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-57 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 3: ac:b3:13:2b:90:60 ssid='Diehl' wpa_ie_len=0 rsn_ie_len=20 caps=0xc11 level=-79 freq=2462 wps wlp5s0: skip - SSID mismatch wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-31 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55e7e6074d70 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55e7e6076980 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55e7e6076980 after 0.000027 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 05 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found WPA: Renewed SNonce - hexdump(len=32): 7b 74 59 c4 8a 32 4a 0b 29 32 3e 5d ad 79 39 bb 00 cf 6e cb 50 35 a1 46 85 a5 46 fc e1 e8 c8 3d WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): 7b 74 59 c4 8a 32 4a 0b 29 32 3e 5d ad 79 39 bb 00 cf 6e cb 50 35 a1 46 85 a5 46 fc e1 e8 c8 3d WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 05 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 5f c8 ab eb d2 10 f5 5d 0a 8f 75 86 8e 28 60 66 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 05 key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 06 key_rsc - hexdump(len=8): 0b 0a 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 e9 18 5c 4b 84 11 93 fd 9e 8a fd a0 49 f2 4c WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): 93 66 71 29 c9 14 4d e9 d5 d1 0b f9 18 9d dc 36 f5 62 15 86 07 00 b3 10 18 99 6b 11 76 aa d6 4d 2a 56 90 6c 8d af c5 24 8d 42 7c 09 ff 33 b8 ea bd 4f 5a 36 ec 26 c5 ab 19 01 15 b5 89 c7 6b a3 20 38 1b 90 1d 0f b1 e6 66 a6 f6 6b 2c 4f 20 e6 80 79 fe 7c 85 a2 b8 60 WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 27 ea 1d 8a 67 55 60 fb 13 9f b0 bb 91 dd 1d e3 wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55e7e60373f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 0b 0a 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55e7e55d2909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 0b 0a 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55e7e6076980 done in 0.048102 seconds wlp5s0: radio_work_free('sme-connect'@0x55e7e6076980): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (4 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 9 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55e7e55d2909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55e7e60354b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 11 wlp5s0: Add radio work 'scan'@0x55e7e606f3f0 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55e7e606f3f0 after 0.000017 second wait wlp5s0: nl80211: scan request Scan requested (ret=0) - scan timeout 30 seconds nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000047 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.636219 seconds nl80211: Received scan results (4 BSSes) wlp5s0: BSS: Start scan result update 10 BSS: last_scan_res_used=4/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP ac:b3:13:2b:90:60 type 0 added WPS: AP[0] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] ac:b3:13:2b:90:60 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55e7e606f3f0 done in 3.640876 seconds wlp5s0: radio_work_free('scan'@0x55e7e606f3f0): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-47 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 1: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-57 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 2: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-58 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: 3: ac:b3:13:2b:90:60 ssid='Diehl' wpa_ie_len=0 rsn_ie_len=20 caps=0xc11 level=-79 freq=2462 wps wlp5s0: skip - SSID mismatch wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-47 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55e7e6074d70 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55e7e606f3f0 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55e7e606f3f0 after 0.000041 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 06 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found WPA: Renewed SNonce - hexdump(len=32): 89 3e 86 91 12 8b 91 21 58 5c 70 60 fe 10 e0 44 19 c7 69 a0 32 ca e2 3f 55 65 b8 f6 16 52 35 6b WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): 89 3e 86 91 12 8b 91 21 58 5c 70 60 fe 10 e0 44 19 c7 69 a0 32 ca e2 3f 55 65 b8 f6 16 52 35 6b WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 06 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 20 e0 53 a6 d4 8e 80 dc 41 3f 2a e9 ed 75 27 7c dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 06 key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 07 key_rsc - hexdump(len=8): 10 0a 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 1c ce 1e 49 f3 65 f5 62 dc 8e b5 96 05 58 4f 97 WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): 99 9c a2 b9 8b d1 ad d1 38 87 25 58 d3 17 48 ea db a2 70 9e e9 49 ad 8a e4 be 38 60 e6 7a 96 b0 6c 36 40 c7 db 74 cd 92 35 97 a0 65 05 f0 24 fa c9 63 1c e2 a5 20 5e ac cb d4 33 f3 79 a6 b7 1b 5a 74 76 1a 5b 6a 06 f4 0f ae cd d2 ec 37 34 9e cb 03 c5 1a 85 ad 36 87 WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 98 7d 37 15 52 4b 0c 44 e8 06 57 1c 4a 7d d6 df wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55e7e60373f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 10 0a 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55e7e55d2909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 10 0a 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55e7e606f3f0 done in 0.049776 seconds wlp5s0: radio_work_free('sme-connect'@0x55e7e606f3f0): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (4 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 11 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55e7e55d2909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55e7e60354b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 11 wlp5s0: Add radio work 'scan'@0x55e7e6076980 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55e7e6076980 after 0.000026 second wait wlp5s0: nl80211: scan request Scan requested (ret=0) - scan timeout 30 seconds nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000090 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.643579 seconds nl80211: Received scan results (4 BSSes) wlp5s0: BSS: Start scan result update 12 BSS: last_scan_res_used=4/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP ac:b3:13:2b:90:60 type 0 added WPS: AP[0] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] ac:b3:13:2b:90:60 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55e7e6076980 done in 3.648565 seconds wlp5s0: radio_work_free('scan'@0x55e7e6076980): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-55 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 1: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-57 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 2: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-58 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: 3: ac:b3:13:2b:90:60 ssid='Diehl' wpa_ie_len=0 rsn_ie_len=20 caps=0xc11 level=-79 freq=2462 wps wlp5s0: skip - SSID mismatch wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-55 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55e7e6074d70 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55e7e6076980 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55e7e6076980 after 0.000034 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 07 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found WPA: Renewed SNonce - hexdump(len=32): 9e 2a 65 68 91 4a c4 fe 4d 9a e8 d9 cc 6d 1d 1d 11 79 a6 86 71 20 a7 c3 8f 69 6f ad 6a fc a4 21 WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): 9e 2a 65 68 91 4a c4 fe 4d 9a e8 d9 cc 6d 1d 1d 11 79 a6 86 71 20 a7 c3 8f 69 6f ad 6a fc a4 21 WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 07 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): e2 cb 72 f8 48 08 5d b4 fb 0d ea a4 05 30 a8 c1 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 07 key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 08 key_rsc - hexdump(len=8): 14 0a 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 56 61 61 ac cb 4c 3c 95 ce b2 d7 dc 5a d5 fb 46 WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): c0 69 a7 ba 06 81 56 e6 e0 4b 66 a7 ff da db bc 2c 93 d7 8c 9f 3f 98 a2 7d 74 93 6f 49 01 03 64 1f d0 7c 95 4c f7 39 85 27 17 7a 1b 02 34 37 26 1a 0e 30 37 be c7 33 be 63 90 76 59 c8 ef 24 1e 5f 91 94 25 4b 04 3e 5d c8 9f 57 f5 36 5e 14 b4 de 5c 99 a5 2e 59 f6 e5 WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): c8 cf a7 de 4e 7c 7f 97 70 f7 6b c2 c8 4d d3 ac wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55e7e60373f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 14 0a 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55e7e55d2909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 14 0a 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55e7e6076980 done in 0.053816 seconds wlp5s0: radio_work_free('sme-connect'@0x55e7e6076980): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (4 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 13 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55e7e55d2909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55e7e60354b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 11 wlp5s0: Add radio work 'scan'@0x55e7e6034890 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55e7e6034890 after 0.000014 second wait wlp5s0: nl80211: scan request Scan requested (ret=0) - scan timeout 30 seconds nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000053 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.629369 seconds nl80211: Received scan results (4 BSSes) wlp5s0: BSS: Start scan result update 14 BSS: last_scan_res_used=4/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP ac:b3:13:2b:90:60 type 0 added WPS: AP[0] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] ac:b3:13:2b:90:60 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55e7e6034890 done in 3.633979 seconds wlp5s0: radio_work_free('scan'@0x55e7e6034890): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 1: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-56 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: 2: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-57 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 3: ac:b3:13:2b:90:60 ssid='Diehl' wpa_ie_len=0 rsn_ie_len=20 caps=0xc11 level=-79 freq=2462 wps wlp5s0: skip - SSID mismatch wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55e7e6074d70 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55e7e6034890 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55e7e6034890 after 0.000037 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 08 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found WPA: Renewed SNonce - hexdump(len=32): 1f be de a8 4b 32 de 42 3f 59 45 92 41 e7 0f dd 66 9a 8e 3b 4b c9 5d 28 6a 50 25 5a e7 0d 87 8e WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): 1f be de a8 4b 32 de 42 3f 59 45 92 41 e7 0f dd 66 9a 8e 3b 4b c9 5d 28 6a 50 25 5a e7 0d 87 8e WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 08 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 69 10 a1 1c 4a 43 33 1d 22 32 88 cb 09 95 ba 67 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 08 key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 09 key_rsc - hexdump(len=8): 19 0a 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): ad 40 c3 96 28 3b b6 cc ba 41 44 d9 75 41 70 96 WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): 49 b2 89 bf e7 50 fd 12 8f cd e9 a2 24 01 54 4a a1 1a 20 2d f2 f2 67 22 cd f1 ac 0d ab eb d7 0d 14 90 b4 fc be 94 25 a1 87 87 cb 9f 56 6a 19 f7 b3 4a 08 6d 69 de 64 49 c6 3a 17 aa 39 dd a1 38 6b 7e 6f 80 f9 0f e5 67 67 70 1d 8d 0e ea c5 e9 70 87 ab 34 82 da de bb WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 4a 95 aa f5 4c 56 1c a0 c3 cb 6d bd 03 42 88 4e wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55e7e60373f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 19 0a 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55e7e55d2909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 19 0a 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55e7e6034890 done in 0.052683 seconds wlp5s0: radio_work_free('sme-connect'@0x55e7e6034890): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (4 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 15 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55e7e55d2909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55e7e60354b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 11 wlp5s0: Add radio work 'scan'@0x55e7e6075970 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55e7e6075970 after 0.000015 second wait wlp5s0: nl80211: scan request Scan requested (ret=0) - scan timeout 30 seconds nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000057 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.647942 seconds nl80211: Received scan results (4 BSSes) wlp5s0: BSS: Start scan result update 16 BSS: last_scan_res_used=4/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP ac:b3:13:2b:90:60 type 0 added WPS: AP[0] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] ac:b3:13:2b:90:60 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55e7e6075970 done in 3.652816 seconds wlp5s0: radio_work_free('scan'@0x55e7e6075970): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-47 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 1: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-57 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 2: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-58 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: 3: ac:b3:13:2b:90:60 ssid='Diehl' wpa_ie_len=0 rsn_ie_len=20 caps=0xc11 level=-79 freq=2462 wps wlp5s0: skip - SSID mismatch wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-47 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55e7e6074d70 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55e7e6075970 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55e7e6075970 after 0.000064 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 09 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found WPA: Renewed SNonce - hexdump(len=32): 3c 13 e5 3b 58 54 4c be e4 cf 83 ba b4 5f 7d 14 a1 37 0f a6 d9 34 25 54 32 ba f0 2f 77 f1 c3 f1 WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): 3c 13 e5 3b 58 54 4c be e4 cf 83 ba b4 5f 7d 14 a1 37 0f a6 d9 34 25 54 32 ba f0 2f 77 f1 c3 f1 WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 09 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 51 7c 33 95 d0 e8 c3 64 0d a6 d4 f0 2a 81 46 38 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 09 key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0a key_rsc - hexdump(len=8): 1e 0a 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 2e b7 5c 2c f7 d8 37 0f 14 63 62 9d 67 16 ce 98 WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): 49 f2 32 50 cf b3 fe a5 77 da 56 94 3e 71 d6 59 d5 82 88 24 e6 5f b5 c0 03 8e d4 62 53 99 73 1a 09 87 0e 64 e1 64 71 54 5f 92 ef a5 75 39 98 5c 76 22 09 9f d0 0b 34 4f fd 89 3d d2 24 62 aa 50 dd f2 0b e6 32 22 fd 9b d1 3a d6 21 ca 0e 37 93 3b 3e 49 94 aa 60 26 bc WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 71 a8 ca 4c b6 9d 06 8e 88 e7 83 f3 a3 e0 09 a7 wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55e7e60373f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 1e 0a 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55e7e55d2909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 1e 0a 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55e7e6075970 done in 0.047404 seconds wlp5s0: radio_work_free('sme-connect'@0x55e7e6075970): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (4 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 17 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55e7e55d2909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55e7e60354b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 11 wlp5s0: Add radio work 'scan'@0x55e7e6034890 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55e7e6034890 after 0.000031 second wait wlp5s0: nl80211: scan request Scan requested (ret=0) - scan timeout 30 seconds nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000032 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.632393 seconds nl80211: Received scan results (5 BSSes) wlp5s0: BSS: Start scan result update 18 wlp5s0: BSS: Add new id 7 BSSID 00:1a:2b:94:10:c3 SSID 'E Ford' freq 2462 dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7' BSS: last_scan_res_used=5/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP ac:b3:13:2b:90:60 type 0 added WPS: AP[0] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] ac:b3:13:2b:90:60 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55e7e6034890 done in 3.637248 seconds wlp5s0: radio_work_free('scan'@0x55e7e6034890): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-56 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 1: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-58 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 2: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-58 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: 3: ac:b3:13:2b:90:60 ssid='Diehl' wpa_ie_len=0 rsn_ie_len=20 caps=0xc11 level=-79 freq=2462 wps wlp5s0: skip - SSID mismatch wlp5s0: 4: 00:1a:2b:94:10:c3 ssid='E Ford' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-79 freq=2462 wlp5s0: skip - SSID mismatch wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-56 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55e7e6074d70 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55e7e6034890 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55e7e6034890 after 0.000045 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0a key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found WPA: Renewed SNonce - hexdump(len=32): d1 8d fc 75 ec 77 63 25 d4 0e 34 34 62 cc 26 77 6d a3 e6 98 12 e7 ae 90 84 3e a5 79 1c 7f 53 c1 WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): d1 8d fc 75 ec 77 63 25 d4 0e 34 34 62 cc 26 77 6d a3 e6 98 12 e7 ae 90 84 3e a5 79 1c 7f 53 c1 WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0a WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 15 d4 f9 5d 8f a8 9f 83 23 ac 47 17 1f 5f 36 5c dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0a key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0b key_rsc - hexdump(len=8): 23 0a 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): a2 cb 0a b5 5c 73 60 13 f9 4e f8 87 ea 1f 0d e8 WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): e2 46 93 98 07 35 0b f1 22 f6 08 24 b0 b1 04 88 d1 5d ad af 73 53 70 04 8e aa d5 73 d7 ee cb 33 88 a2 c8 61 46 a4 7d 36 2f e2 b9 aa 9d c3 ae 20 bf 9f 3a 90 b3 71 9d 10 f1 c7 4c 5f ce 9a e6 13 92 42 35 10 79 21 9e 05 05 a9 03 00 d6 e4 3e 47 d0 f7 7f ea a1 7b ef 40 WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 7f 24 66 54 65 6b 41 32 9d b2 22 97 d6 1c 0d 95 wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55e7e60373f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 23 0a 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55e7e55d2909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 23 0a 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55e7e6034890 done in 0.048036 seconds wlp5s0: radio_work_free('sme-connect'@0x55e7e6034890): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (5 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 19 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55e7e55d2909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55e7e60354b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 11 wlp5s0: Add radio work 'scan'@0x55e7e6076980 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55e7e6076980 after 0.000017 second wait wlp5s0: nl80211: scan request Scan requested (ret=0) - scan timeout 30 seconds nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000077 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.637536 seconds nl80211: Received scan results (4 BSSes) wlp5s0: BSS: Start scan result update 20 BSS: last_scan_res_used=4/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP[0] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55e7e6076980 done in 3.642219 seconds wlp5s0: radio_work_free('scan'@0x55e7e6076980): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-44 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 1: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-58 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 2: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-58 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: 3: 00:1a:2b:94:10:c3 ssid='E Ford' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-79 freq=2462 wlp5s0: skip - SSID mismatch wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-44 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55e7e6074d70 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55e7e6076980 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55e7e6076980 after 0.000036 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0b key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found WPA: Renewed SNonce - hexdump(len=32): 8f 2c 69 ab 79 03 af 80 51 7a c3 27 bb 8a ef 4d 05 ce 6b c4 4b ff 3e 2a 38 2e 2f b8 45 39 f4 16 WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): 8f 2c 69 ab 79 03 af 80 51 7a c3 27 bb 8a ef 4d 05 ce 6b c4 4b ff 3e 2a 38 2e 2f b8 45 39 f4 16 WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0b WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 88 bc 5d bd 6e 88 30 4c 68 12 1b a4 ef 86 ac 8e dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0b key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0c key_rsc - hexdump(len=8): 27 0a 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 79 fe 92 f5 74 b5 0e 1b 22 fc b2 e5 28 0a 0f d7 WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): dd a8 b5 c4 b3 08 73 9e fe f2 66 a0 f0 9f 0a 11 4c a0 a0 28 18 b0 f8 76 98 d0 be b1 d7 12 de a7 d7 0a 74 55 e4 8a 7d 77 f0 9e 07 d4 3c 8b 08 8d 68 5b 0e 0f e6 3c 5a 04 63 16 65 5f 32 b6 ff 99 8d 04 c2 9d 6b ca 60 44 88 78 7e e1 06 df be 61 78 cb bf 3c b6 e7 ca 7f WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 96 c5 d9 d2 dd 3f 88 b9 22 e8 2e c2 c0 c7 e1 f0 wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55e7e60373f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 27 0a 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55e7e55d2909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 27 0a 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55e7e6076980 done in 0.052536 seconds wlp5s0: radio_work_free('sme-connect'@0x55e7e6076980): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (4 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 21 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55e7e55d2909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55e7e60354b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 11 wlp5s0: Add radio work 'scan'@0x55e7e606f3f0 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55e7e606f3f0 after 0.000019 second wait wlp5s0: nl80211: scan request Scan requested (ret=0) - scan timeout 30 seconds nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000056 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.656589 seconds nl80211: Received scan results (4 BSSes) wlp5s0: BSS: Start scan result update 22 wlp5s0: BSS: Remove id 6 BSSID ac:b3:13:2b:90:60 SSID 'Diehl' due to no match in scan dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6' BSS: last_scan_res_used=4/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP[0] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55e7e606f3f0 done in 3.661361 seconds wlp5s0: radio_work_free('scan'@0x55e7e606f3f0): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-47 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 1: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-56 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: 2: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-57 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 3: 00:1a:2b:94:10:c3 ssid='E Ford' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-79 freq=2462 wlp5s0: skip - SSID mismatch wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-47 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55e7e6074d70 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55e7e606f3f0 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55e7e606f3f0 after 0.000053 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0c key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found WPA: Renewed SNonce - hexdump(len=32): 84 50 00 b1 c0 cd b7 61 0f f1 9b 03 d3 c6 95 d0 53 0a e2 85 ee 5a c4 85 88 64 24 77 a3 e6 0a 96 WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): 84 50 00 b1 c0 cd b7 61 0f f1 9b 03 d3 c6 95 d0 53 0a e2 85 ee 5a c4 85 88 64 24 77 a3 e6 0a 96 WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0c WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): a7 9f 2d ec ec 25 b7 de 1b 2c 1e ad 4a 5f 6f 39 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0c key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0d key_rsc - hexdump(len=8): 2d 0a 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 08 fb fc 88 34 33 e6 ad c3 e0 8d 4d 7c bc f4 6e WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): 9f ae 27 8d f0 05 39 40 69 24 c5 93 0e fe 14 9a 92 4e d5 72 a6 d4 91 fb 53 90 81 cc ca 39 49 3a 1a e4 70 9a ec 72 d6 31 11 cf ed ac 1c 66 8a a9 da 80 aa 47 af e1 b4 99 72 53 19 f1 70 5c e6 b1 83 d5 ef da 0f 89 99 6f 96 06 4e 5e e1 99 e3 2c 3d dc 82 a8 33 ef 7e da WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 46 ed 1e 0c bd 74 d8 f4 6e e4 5f 3e 1e 2d 8a f5 wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55e7e60373f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 2d 0a 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55e7e55d2909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 2d 0a 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55e7e606f3f0 done in 0.057208 seconds wlp5s0: radio_work_free('sme-connect'@0x55e7e606f3f0): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (4 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 23 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55e7e55d2909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55e7e60354b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1002 () nl80211: Interface down (wlp5s0/wlp5s0) wlp5s0: Event INTERFACE_DISABLED (26) received wlp5s0: Interface was disabled nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: BSS: Remove id 3 BSSID d8:b6:b7:ee:fc:18 SSID 'Depeche Modem' due to wpa_bss_flush dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3' wlp5s0: BSS: Remove id 5 BSSID da:31:34:e1:8b:79 SSID 'DIRECT-roku-866-CE748F' due to wpa_bss_flush dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5' wlp5s0: BSS: Remove id 4 BSSID da:31:34:e1:8b:79 SSID '' due to wpa_bss_flush dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4' wlp5s0: BSS: Remove id 7 BSSID 00:1a:2b:94:10:c3 SSID 'E Ford' due to wpa_bss_flush dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7' wlp5s0: State: DISCONNECTED -> INTERFACE_DISABLED wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1002 () l2_packet_receive - recvfrom: Network is down l2_packet_receive - recvfrom: Network is down dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Interface up (wlp5s0/wlp5s0) nl80211: Own MAC address on ifindex 3 (wlp5s0) changed from 40:e2:30:17:0e:e8 to 2a:fe:96:66:ff:cd wlp5s0: Event INTERFACE_ENABLED (25) received wlp5s0: Interface was enabled wlp5s0: State: INTERFACE_DISABLED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Rescheduling scan request: 0.000000 sec wlp5s0: No enabled networks - do not scan wlp5s0: State: DISCONNECTED -> INACTIVE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Add radio work 'scan'@0x55e7e6068a20 wlp5s0: First radio work item in the queue - schedule start immediately nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Starting radio work 'scan'@0x55e7e6068a20 after 0.000446 second wait Request driver to clear scan cache due to local BSS flush wlp5s0: nl80211: scan request nl80211: Add NL80211_SCAN_FLAG_FLUSH Scan requested (ret=0) - scan timeout 30 seconds wlp5s0: Reject scan trigger since one is already pending nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000138 seconds RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.671262 seconds nl80211: Received scan results (2 BSSes) wlp5s0: BSS: Start scan result update 24 wlp5s0: BSS: Add new id 8 BSSID d8:b6:b7:ee:fc:18 SSID 'Depeche Modem' freq 2442 dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/8' wlp5s0: BSS: Add new id 9 BSSID da:31:34:e1:8b:79 SSID '' freq 2442 dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9' BSS: last_scan_res_used=2/32 wlp5s0: Scan-only results received wlp5s0: Radio work 'scan'@0x55e7e6068a20 done in 3.675729 seconds wlp5s0: radio_work_free('scan'@0x55e7e6068a20): num_active_works --> 0 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1002 () nl80211: Interface down (wlp5s0/wlp5s0) wlp5s0: Event INTERFACE_DISABLED (26) received wlp5s0: Interface was disabled nl80211: Data frame filter flags=0x0 wlp5s0: State: INACTIVE -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: BSS: Remove id 8 BSSID d8:b6:b7:ee:fc:18 SSID 'Depeche Modem' due to wpa_bss_flush dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/8' wlp5s0: BSS: Remove id 9 BSSID da:31:34:e1:8b:79 SSID '' due to wpa_bss_flush dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9' wlp5s0: State: DISCONNECTED -> INTERFACE_DISABLED wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: l2_packet_receive - recvfrom: Network is down l2_packet_receive - recvfrom: Network is down RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1002 () dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Interface up (wlp5s0/wlp5s0) nl80211: Own MAC address on ifindex 3 (wlp5s0) changed from 2a:fe:96:66:ff:cd to 40:e2:30:17:0e:e8 wlp5s0: Event INTERFACE_ENABLED (25) received wlp5s0: Interface was enabled wlp5s0: State: INTERFACE_DISABLED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Setting scan request: 0.000000 sec wlp5s0: No enabled networks - do not scan wlp5s0: State: DISCONNECTED -> INACTIVE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' wlp5s0: Setting scan request: 0.000000 sec wlp5s0: State: INACTIVE -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 11 wlp5s0: Add radio work 'scan'@0x55e7e60797d0 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55e7e60797d0 after 0.000012 second wait Request driver to clear scan cache due to local BSS flush wlp5s0: nl80211: scan request nl80211: Add NL80211_SCAN_FLAG_FLUSH Scan requested (ret=0) - scan timeout 30 seconds nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000026 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: Removing interface wlp5s0 wlp5s0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=SCANNING TDLS: Tear down peers nl80211: Data frame filter flags=0x0 wlp5s0: State: SCANNING -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' wlp5s0: WPA: Clear old PMK and PTK Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Cancelling scan request wlp5s0: Cancelling authentication timeout Off-channel: Clear pending Action frame TX (pending_action_tx=(nil) nl80211: Data frame filter flags=0x0 HS20: Delete all stored icons Off-channel: Action frame sequence done notification: pending_action_tx=(nil) drv_offchan_tx=1 action_tx_wait_time=0 off_channel_freq=0 roc_waiting_drv_freq=0 wlp5s0: P2P: Disable P2P since removing the management interface is being removed P2P: All ASP advertisements flushed P2P: Disabling Extended Listen Timing P2P: Stopping find P2P: Clear timeout (state=IDLE) P2P: State IDLE -> IDLE P2P: All ASP advertisements flushed Remove interface wlp5s0 from radio phy0 wlp5s0: Remove radio work 'scan'@0x55e7e60797d0 (started) wlp5s0: radio_work_free('scan'@0x55e7e60797d0): num_active_works --> 0 Remove radio phy0 nl80211: deinit ifname=wlp5s0 disabled_11b_rates=0 nl80211: Remove monitor interface: refcount=0 netlink: Operstate: ifindex=3 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) nl80211: Set mode ifindex 3 iftype 2 (STATION) nl80211: Unsubscribe mgmt frames handle 0x8888dd6f6e8b0979 (mode change) dbus: Unregister interface object '/fi/w1/wpa_supplicant1/Interfaces/1' wlp5s0: CTRL-EVENT-TERMINATING dbus: Unregister D-Bus object '/fi/w1/wpa_supplicant1'
wpa_supplicant v2.8-devel random: getrandom() support available dbus: Register D-Bus object '/fi/w1/wpa_supplicant1' Providing DBus service 'fi.w1.wpa_supplicant1'. Providing DBus service 'fi.epitest.hostap.WPASupplicant'. Successfully initialized wpa_supplicant dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1) [s] dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1) [s] dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1) [s] dbus: fi.w1.wpa_supplicant1.CreateInterface (/fi/w1/wpa_supplicant1) [a{sv}] wpa_dbus_dict_open_read: start reading a dict entry wpa_dbus_dict_get_entry: dict entry key: Driver wpa_dbus_dict_get_entry: dict entry variant content type: s _wpa_dbus_dict_fill_value_from_variant: string value: [omitted] wpa_dbus_dict_get_entry: dict entry key: Ifname wpa_dbus_dict_get_entry: dict entry variant content type: s _wpa_dbus_dict_fill_value_from_variant: string value: [omitted] Override interface parameter: ctrl_interface ('(null)' -> '/run/wpa_supplicant') Initializing interface 'wlp5s0' conf 'N/A' driver 'nl80211,wext' ctrl_interface '/run/wpa_supplicant' bridge 'N/A' nl80211: TDLS supported nl80211: TDLS external setup nl80211: Supported cipher 00-0f-ac:1 nl80211: Supported cipher 00-0f-ac:5 nl80211: Supported cipher 00-0f-ac:2 nl80211: Supported cipher 00-0f-ac:4 nl80211: Supported cipher 00-0f-ac:10 nl80211: Supported cipher 00-0f-ac:8 nl80211: Supported cipher 00-0f-ac:9 nl80211: Supported cipher 00-0f-ac:6 nl80211: Supported cipher 00-0f-ac:13 nl80211: Supported cipher 00-0f-ac:11 nl80211: Supported cipher 00-0f-ac:12 nl80211: Using driver-based off-channel TX nl80211: Driver-advertised extended capabilities (default) - hexdump(len=8): 00 00 00 00 00 00 00 40 nl80211: Driver-advertised extended capabilities mask (default) - hexdump(len=8): 00 00 00 00 00 00 00 40 nl80211: Use separate P2P group interface (driver advertised support) nl80211: interface wlp5s0 in phy phy0 nl80211: Set mode ifindex 3 iftype 2 (STATION) nl80211: Subscribe to mgmt frames with non-AP handle 0x55d58a2141f0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=0104 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=040a nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=040b nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=040c nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=040d nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=090a nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=090b nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=090c nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=090d nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=0409506f9a09 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=7f506f9a09 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=0409506f9a1a nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=0801 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=040e nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=12 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=06 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=0a07 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=0a11 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=0a1a nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=1101 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=1102 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=0505 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55d58a2141f0 match=0500 rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0 netlink: Operstate: ifindex=3 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT) Add interface wlp5s0 to a new radio phy0 nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Own MAC address: e6:eb:28:9c:6b:39 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wlp5s0: RSN: flushing PMKID list in the driver nl80211: Flush PMKIDs wlp5s0: State: DISCONNECTED -> INACTIVE TDLS: TDLS operation supported by driver TDLS: Driver uses external link setup TDLS: Driver does not support TDLS channel switching wlp5s0: WPS: UUID based on MAC address: 0193fa7d-9931-50d9-845f-41098eb26f73 ENGINE: Loading dynamic engine ENGINE: Loading dynamic engine EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Own listen channel: 81:6 P2P: Random operating channel: 81:1 P2P: initialized P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: dbus: Register interface object '/fi/w1/wpa_supplicant1/Interfaces/1' wlp5s0: Added interface wlp5s0 wlp5s0: State: INACTIVE -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1) [s] dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1) [s] dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1) [s] dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv] properties_get_or_set: Set(BSSExpireAge) wlp5s0: Setting bss expiration age: 250 sec dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv] properties_get_or_set: Set(BSSExpireCount) wlp5s0: Setting bss expiration scan count: 2 dbus: fi.w1.wpa_supplicant1.Interface.NetworkReply (/fi/w1/wpa_supplicant1/Interfaces/1) [oss] RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] wlp5s0: Add radio work 'scan'@0x55d58a20b1d0 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55d58a20b1d0 after 0.000026 second wait wlp5s0: nl80211: scan request nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] Scan requested (ret=0) - scan timeout 10 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Event message available nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000055 seconds EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.653229 seconds nl80211: Received scan results (3 BSSes) wlp5s0: BSS: Start scan result update 1 wlp5s0: BSS: Add new id 0 BSSID d8:b6:b7:ee:fc:18 SSID 'Depeche Modem' freq 2442 dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0' wlp5s0: BSS: Add new id 1 BSSID da:31:34:e1:8b:79 SSID '' freq 2442 dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1' wlp5s0: BSS: Add new id 2 BSSID da:31:34:e1:8b:79 SSID 'DIRECT-roku-866-CE748F' freq 2442 dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2' BSS: last_scan_res_used=3/32 wlp5s0: Scan-only results received wlp5s0: Radio work 'scan'@0x55d58a20b1d0 done in 3.660895 seconds wlp5s0: radio_work_free('scan'@0x55d58a20b1d0): num_active_works --> 0 dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0) [s] dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1) [s] dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2) [s] RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1002 () nl80211: Interface down (wlp5s0/wlp5s0) wlp5s0: Event INTERFACE_DISABLED (26) received wlp5s0: Interface was disabled nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: BSS: Remove id 0 BSSID d8:b6:b7:ee:fc:18 SSID 'Depeche Modem' due to wpa_bss_flush dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0' wlp5s0: BSS: Remove id 1 BSSID da:31:34:e1:8b:79 SSID '' due to wpa_bss_flush dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1' wlp5s0: BSS: Remove id 2 BSSID da:31:34:e1:8b:79 SSID 'DIRECT-roku-866-CE748F' due to wpa_bss_flush dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2' wlp5s0: State: DISCONNECTED -> INTERFACE_DISABLED wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1002 () l2_packet_receive - recvfrom: Network is down l2_packet_receive - recvfrom: Network is down dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Interface up (wlp5s0/wlp5s0) nl80211: Own MAC address on ifindex 3 (wlp5s0) changed from e6:eb:28:9c:6b:39 to 40:e2:30:17:0e:e8 wlp5s0: Event INTERFACE_ENABLED (25) received wlp5s0: Interface was enabled wlp5s0: State: INTERFACE_DISABLED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Setting scan request: 0.000000 sec wlp5s0: No enabled networks - do not scan wlp5s0: State: DISCONNECTED -> INACTIVE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv] properties_get_or_set: Set(ApScan) dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' wpa_dbus_dict_open_read: start reading a dict entry wpa_dbus_dict_get_entry: dict entry key: scan_ssid wpa_dbus_dict_get_entry: dict entry variant content type: i _wpa_dbus_dict_fill_value_from_variant: int32 value: 1 scan_ssid=1 (0x1) wpa_dbus_dict_get_entry: dict entry key: psk wpa_dbus_dict_get_entry: dict entry variant content type: s _wpa_dbus_dict_fill_value_from_variant: string value: [omitted] PSK (ASCII passphrase) - hexdump_ascii(len=9): [REMOVED] wpa_dbus_dict_get_entry: dict entry key: ieee80211w wpa_dbus_dict_get_entry: dict entry variant content type: i _wpa_dbus_dict_fill_value_from_variant: int32 value: 1 ieee80211w=1 (0x1) wpa_dbus_dict_get_entry: dict entry key: bgscan wpa_dbus_dict_get_entry: dict entry variant content type: a _wpa_dbus_dict_entry_get_array: array_type y dbus: byte array contents - hexdump(len=19): [REMOVED] bgscan - hexdump_ascii(len=19): 73 69 6d 70 6c 65 3a 33 30 3a 2d 38 30 3a 38 36 simple:30:-80:86 34 30 30 400 wpa_dbus_dict_get_entry: dict entry key: key_mgmt wpa_dbus_dict_get_entry: dict entry variant content type: s _wpa_dbus_dict_fill_value_from_variant: string value: [omitted] key_mgmt: 0x102 wpa_dbus_dict_get_entry: dict entry key: ssid wpa_dbus_dict_get_entry: dict entry variant content type: a _wpa_dbus_dict_entry_get_array: array_type y dbus: byte array contents - hexdump(len=13): [REMOVED] ssid - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem PSK (from passphrase) - hexdump(len=32): [REMOVED] dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] wlp5s0: Setting scan request: 0.000000 sec wlp5s0: State: INACTIVE -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 6 wlp5s0: Add radio work 'scan'@0x55d58a253000 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55d58a253000 after 0.000011 second wait Request driver to clear scan cache due to local BSS flush wlp5s0: nl80211: scan request nl80211: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] nl80211: Scan extra IEs - hexdump(len=136): 7f 08 00 00 00 00 01 00 00 40 dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 31 48 10 47 00 10 01 93 fa 7d 99 31 50 d9 84 5f 41 09 8e b2 6f 73 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 06 nl80211: Add NL80211_SCAN_FLAG_FLUSH Scan requested (ret=0) - scan timeout 30 seconds nl80211: Event message available nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000016 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.637005 seconds nl80211: Received scan results (4 BSSes) wlp5s0: BSS: Start scan result update 2 wlp5s0: BSS: Add new id 3 BSSID d8:b6:b7:ee:fc:18 SSID 'Depeche Modem' freq 2442 dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3' wlp5s0: BSS: Add new id 4 BSSID da:31:34:e1:8b:79 SSID 'DIRECT-roku-866-CE748F' freq 2442 dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4' wlp5s0: BSS: Add new id 5 BSSID da:31:34:e1:8b:79 SSID '' freq 2442 dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5' wlp5s0: BSS: Add new id 6 BSSID ac:b3:13:2b:90:60 SSID 'Diehl' freq 2462 dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6' BSS: last_scan_res_used=4/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP ac:b3:13:2b:90:60 type 0 added WPS: AP[0] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] ac:b3:13:2b:90:60 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55d58a253000 done in 3.642610 seconds wlp5s0: radio_work_free('scan'@0x55d58a253000): num_active_works --> 0 wlp5s0: Scan results matching the currently selected network wlp5s0: 0: d8:b6:b7:ee:fc:18 freq=2442 level=-50 snr=32 est_throughput=135000 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-50 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 1 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55d58a252400 current_ssid=0x55d58a252400 wlp5s0: Request association with d8:b6:b7:ee:fc:18 TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55d58a253000 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55d58a253000 after 0.000041 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=0x55d58a252400 try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 PSK (set in config) - hexdump(len=32): [REMOVED] WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3) [s] dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4) [s] dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5) [s] dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6) [s] nl80211: Event message available nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 nl80211: Event message available nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 00 28 00 00 02 00 00 00 dd 09 00 10 18 02 06 00 0c 00 00 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 06 00 0c 00 00 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully nl80211: Event message available nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 10 28 11 04 00 00 03 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Event message available nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0d key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found Get randomness: len=32 entropy=8 WPA: Renewed SNonce - hexdump(len=32): 95 08 91 fe e4 d6 98 19 9b 8f e6 bf 90 57 ec 2a f9 81 14 82 8e fb e5 f5 a2 71 3f 48 9a 71 55 c3 WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): 95 08 91 fe e4 d6 98 19 9b 8f e6 bf 90 57 ec 2a f9 81 14 82 8e fb e5 f5 a2 71 3f 48 9a 71 55 c3 WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0d WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 9a 4d 22 92 9d 6b fd 22 13 ee 35 00 b7 0f d2 e4 WPA: TX EAPOL-Key - hexdump(len=127): 01 03 00 7b 02 01 0a 00 00 00 00 00 00 00 00 00 00 95 08 91 fe e4 d6 98 19 9b 8f e6 bf 90 57 ec 2a f9 81 14 82 8e fb e5 f5 a2 71 3f 48 9a 71 55 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9a 4d 22 92 9d 6b fd 22 13 ee 35 00 b7 0f d2 e4 00 1c 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0d 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0e 43 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 56 6a e2 25 38 5d 11 fd 55 6c 99 b2 70 d7 4f 2d 00 58 00 f8 e7 01 0f fa dc 0e 65 67 65 1a f6 45 27 d2 71 50 fd 27 5f 08 e8 8d dc 7b 99 24 2d 2e bc 66 eb 0d fc d0 b1 39 5f 69 02 0d 77 80 22 64 e3 d0 2c 15 fb de 36 fa 83 d9 05 c2 58 48 3b af bc 2b 02 db 58 6e 6f db fe 2d c1 d3 dc 8e 45 79 bb 04 63 60 65 f0 4a 64 ef 95 wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 WPA: RX EAPOL-Key - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0d 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0e 43 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 56 6a e2 25 38 5d 11 fd 55 6c 99 b2 70 d7 4f 2d 00 58 00 f8 e7 01 0f fa dc 0e 65 67 65 1a f6 45 27 d2 71 50 fd 27 5f 08 e8 8d dc 7b 99 24 2d 2e bc 66 eb 0d fc d0 b1 39 5f 69 02 0d 77 80 22 64 e3 d0 2c 15 fb de 36 fa 83 d9 05 c2 58 48 3b af bc 2b 02 db 58 6e 6f db fe 2d c1 d3 dc 8e 45 79 bb 04 63 60 65 f0 4a 64 ef 95 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0d key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0e key_rsc - hexdump(len=8): 43 0a 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 56 6a e2 25 38 5d 11 fd 55 6c 99 b2 70 d7 4f 2d WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): 00 f8 e7 01 0f fa dc 0e 65 67 65 1a f6 45 27 d2 71 50 fd 27 5f 08 e8 8d dc 7b 99 24 2d 2e bc 66 eb 0d fc d0 b1 39 5f 69 02 0d 77 80 22 64 e3 d0 2c 15 fb de 36 fa 83 d9 05 c2 58 48 3b af bc 2b 02 db 58 6e 6f db fe 2d c1 d3 dc 8e 45 79 bb 04 63 60 65 f0 4a 64 ef 95 WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): b9 ef e1 c8 81 ba a0 cf 16 af 23 76 ce 9d 60 38 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b9 ef e1 c8 81 ba a0 cf 16 af 23 76 ce 9d 60 38 00 00 wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d58a2133f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 43 0a 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d5889ec909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 43 0a 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55d58a253000 done in 0.052839 seconds wlp5s0: radio_work_free('sme-connect'@0x55d58a253000): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (4 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 3 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55d5889ec909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55d58a2114b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Event message available nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=d8:b6:b7:ee:fc:18 A2=40:e2:30:17:0e:e8 nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 d8 b6 b7 ee fc 18 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 00 00 01 00 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Event message available nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 6 wlp5s0: Add radio work 'scan'@0x55d58a2153c0 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55d58a2153c0 after 0.000021 second wait wlp5s0: nl80211: scan request nl80211: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] nl80211: Scan extra IEs - hexdump(len=136): 7f 08 00 00 00 00 01 00 00 40 dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 31 48 10 47 00 10 01 93 fa 7d 99 31 50 d9 84 5f 41 09 8e b2 6f 73 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 06 Scan requested (ret=0) - scan timeout 30 seconds nl80211: Event message available nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000030 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.641710 seconds nl80211: Received scan results (4 BSSes) wlp5s0: BSS: Start scan result update 4 BSS: last_scan_res_used=4/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP ac:b3:13:2b:90:60 type 0 added WPS: AP[0] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] ac:b3:13:2b:90:60 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55d58a2153c0 done in 3.646298 seconds wlp5s0: radio_work_free('scan'@0x55d58a2153c0): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 1: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-57 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: 2: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-58 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 3: ac:b3:13:2b:90:60 ssid='Diehl' wpa_ie_len=0 rsn_ie_len=20 caps=0xc11 level=-74 freq=2462 wps wlp5s0: skip - SSID mismatch wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55d58a252400 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55d58a2153c0 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55d58a2153c0 after 0.000043 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 PSK (set in config) - hexdump(len=32): [REMOVED] WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Event message available nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Event message available nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 60 2b 00 00 02 00 00 00 dd 09 00 10 18 02 06 00 0c 00 00 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 06 00 0c 00 00 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Event message available nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 70 2b 11 04 00 00 03 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 nl80211: Event message available nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0e key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found Get randomness: len=32 entropy=5 WPA: Renewed SNonce - hexdump(len=32): 91 25 ab c8 45 b4 8d f8 cf 59 6f e4 b9 ba 0d 97 3f 28 f2 c8 1a 3d 51 ec 7c c3 3d 73 a9 13 37 e9 WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): 91 25 ab c8 45 b4 8d f8 cf 59 6f e4 b9 ba 0d 97 3f 28 f2 c8 1a 3d 51 ec 7c c3 3d 73 a9 13 37 e9 WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0e WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 7e d8 85 eb 0a 8b 79 b2 3c 92 aa 3b 71 cf af 85 WPA: TX EAPOL-Key - hexdump(len=127): 01 03 00 7b 02 01 0a 00 00 00 00 00 00 00 00 00 00 91 25 ab c8 45 b4 8d f8 cf 59 6f e4 b9 ba 0d 97 3f 28 f2 c8 1a 3d 51 ec 7c c3 3d 73 a9 13 37 e9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7e d8 85 eb 0a 8b 79 b2 3c 92 aa 3b 71 cf af 85 00 1c 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0e 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0f 48 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 73 00 c6 22 ec 51 7c bf 57 46 9d 91 ef 08 dc 00 58 96 fc 89 b6 17 bc a1 22 91 ff c6 d1 fd 82 85 98 02 89 0f 25 ab 17 14 a3 79 aa fd d4 cc 5b d5 a4 36 44 bb 5b ee b5 ba c0 37 10 3d 48 6c e7 ea 54 2b 5f 9c 71 d4 bc b9 77 06 3f 64 6d c3 42 8c cf 48 13 39 47 a9 fa 74 78 84 a9 74 98 7e fe 58 c9 d0 f6 bb 38 26 6b 8d 38 wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 WPA: RX EAPOL-Key - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0e 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0f 48 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 73 00 c6 22 ec 51 7c bf 57 46 9d 91 ef 08 dc 00 58 96 fc 89 b6 17 bc a1 22 91 ff c6 d1 fd 82 85 98 02 89 0f 25 ab 17 14 a3 79 aa fd d4 cc 5b d5 a4 36 44 bb 5b ee b5 ba c0 37 10 3d 48 6c e7 ea 54 2b 5f 9c 71 d4 bc b9 77 06 3f 64 6d c3 42 8c cf 48 13 39 47 a9 fa 74 78 84 a9 74 98 7e fe 58 c9 d0 f6 bb 38 26 6b 8d 38 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0e key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0f key_rsc - hexdump(len=8): 48 0a 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 30 73 00 c6 22 ec 51 7c bf 57 46 9d 91 ef 08 dc WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): 96 fc 89 b6 17 bc a1 22 91 ff c6 d1 fd 82 85 98 02 89 0f 25 ab 17 14 a3 79 aa fd d4 cc 5b d5 a4 36 44 bb 5b ee b5 ba c0 37 10 3d 48 6c e7 ea 54 2b 5f 9c 71 d4 bc b9 77 06 3f 64 6d c3 42 8c cf 48 13 39 47 a9 fa 74 78 84 a9 74 98 7e fe 58 c9 d0 f6 bb 38 26 6b 8d 38 WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 63 eb 86 e5 5a 69 c7 1c d2 c3 56 b8 76 3a dd c3 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 63 eb 86 e5 5a 69 c7 1c d2 c3 56 b8 76 3a dd c3 00 00 wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d58a2133f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 48 0a 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d5889ec909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 48 0a 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55d58a2153c0 done in 0.044497 seconds wlp5s0: radio_work_free('sme-connect'@0x55d58a2153c0): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (4 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 5 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55d5889ec909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55d58a2114b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Event message available nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=d8:b6:b7:ee:fc:18 A2=40:e2:30:17:0e:e8 nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 d8 b6 b7 ee fc 18 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 00 00 01 00 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Event message available nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Event message available nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 6 wlp5s0: Add radio work 'scan'@0x55d58a253000 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55d58a253000 after 0.000017 second wait wlp5s0: nl80211: scan request nl80211: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] nl80211: Scan extra IEs - hexdump(len=136): 7f 08 00 00 00 00 01 00 00 40 dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 31 48 10 47 00 10 01 93 fa 7d 99 31 50 d9 84 5f 41 09 8e b2 6f 73 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 06 Scan requested (ret=0) - scan timeout 30 seconds nl80211: Event message available nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000045 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.643309 seconds nl80211: Received scan results (4 BSSes) wlp5s0: BSS: Start scan result update 6 BSS: last_scan_res_used=4/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP ac:b3:13:2b:90:60 type 0 added WPS: AP[0] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] ac:b3:13:2b:90:60 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55d58a253000 done in 3.648085 seconds wlp5s0: radio_work_free('scan'@0x55d58a253000): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-57 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 1: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-58 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: 2: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-66 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 3: ac:b3:13:2b:90:60 ssid='Diehl' wpa_ie_len=0 rsn_ie_len=20 caps=0xc11 level=-74 freq=2462 wps wlp5s0: skip - SSID mismatch wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-57 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 1: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-58 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: 2: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-66 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55d58a252400 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55d58a253000 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55d58a253000 after 0.000034 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 PSK (set in config) - hexdump(len=32): [REMOVED] WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Event message available nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Event message available nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 60 2e 00 00 02 00 00 00 dd 09 00 10 18 02 06 00 0c 00 00 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 06 00 0c 00 00 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully nl80211: Event message available nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 70 2e 11 04 00 00 03 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Event message available nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0f key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found Get randomness: len=32 entropy=5 WPA: Renewed SNonce - hexdump(len=32): b3 04 bf d3 7a 5b 95 d3 6e fe 1d a4 09 3f 88 af 0b 4f 36 03 39 de e6 ff b9 c2 6b 17 50 f1 7c 02 WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): b3 04 bf d3 7a 5b 95 d3 6e fe 1d a4 09 3f 88 af 0b 4f 36 03 39 de e6 ff b9 c2 6b 17 50 f1 7c 02 WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0f WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 86 8a b9 e4 5e 29 e3 66 20 31 21 f4 67 99 43 9e WPA: TX EAPOL-Key - hexdump(len=127): 01 03 00 7b 02 01 0a 00 00 00 00 00 00 00 00 00 00 b3 04 bf d3 7a 5b 95 d3 6e fe 1d a4 09 3f 88 af 0b 4f 36 03 39 de e6 ff b9 c2 6b 17 50 f1 7c 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 86 8a b9 e4 5e 29 e3 66 20 31 21 f4 67 99 43 9e 00 1c 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0f 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 10 4c 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 83 f4 94 22 10 e9 68 b6 5b 28 65 ab 08 d0 75 08 00 58 8a 07 8e db 30 47 f4 cd bd 67 9a 1c 59 00 e1 a8 9e 14 1f 91 64 79 1c 08 ca 6f b9 1c b1 f8 e5 cb 4a d3 32 04 2c 7a 46 00 55 36 aa 46 e9 af 20 83 c1 e3 91 65 53 50 77 60 96 65 be 42 ee 6a 08 bf 17 29 e3 f9 7b f7 43 33 bd 1a 9e ee 21 a4 79 7c 33 d2 2d 46 ed 46 10 69 wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 WPA: RX EAPOL-Key - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0f 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 10 4c 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 83 f4 94 22 10 e9 68 b6 5b 28 65 ab 08 d0 75 08 00 58 8a 07 8e db 30 47 f4 cd bd 67 9a 1c 59 00 e1 a8 9e 14 1f 91 64 79 1c 08 ca 6f b9 1c b1 f8 e5 cb 4a d3 32 04 2c 7a 46 00 55 36 aa 46 e9 af 20 83 c1 e3 91 65 53 50 77 60 96 65 be 42 ee 6a 08 bf 17 29 e3 f9 7b f7 43 33 bd 1a 9e ee 21 a4 79 7c 33 d2 2d 46 ed 46 10 69 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 0f key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 10 key_rsc - hexdump(len=8): 4c 0a 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 83 f4 94 22 10 e9 68 b6 5b 28 65 ab 08 d0 75 08 WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): 8a 07 8e db 30 47 f4 cd bd 67 9a 1c 59 00 e1 a8 9e 14 1f 91 64 79 1c 08 ca 6f b9 1c b1 f8 e5 cb 4a d3 32 04 2c 7a 46 00 55 36 aa 46 e9 af 20 83 c1 e3 91 65 53 50 77 60 96 65 be 42 ee 6a 08 bf 17 29 e3 f9 7b f7 43 33 bd 1a 9e ee 21 a4 79 7c 33 d2 2d 46 ed 46 10 69 WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 04 75 c2 86 11 32 a5 60 54 a7 ca ba 90 bb 3f d9 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 75 c2 86 11 32 a5 60 54 a7 ca ba 90 bb 3f d9 00 00 wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d58a2133f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 4c 0a 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d5889ec909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 4c 0a 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55d58a253000 done in 0.065174 seconds wlp5s0: radio_work_free('sme-connect'@0x55d58a253000): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (4 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 7 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55d5889ec909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55d58a2114b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Event message available nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=d8:b6:b7:ee:fc:18 A2=40:e2:30:17:0e:e8 nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 d8 b6 b7 ee fc 18 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 00 00 01 00 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Event message available nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Event message available nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 6 wlp5s0: Add radio work 'scan'@0x55d58a2153c0 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55d58a2153c0 after 0.000020 second wait wlp5s0: nl80211: scan request nl80211: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] nl80211: Scan extra IEs - hexdump(len=136): 7f 08 00 00 00 00 01 00 00 40 dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 31 48 10 47 00 10 01 93 fa 7d 99 31 50 d9 84 5f 41 09 8e b2 6f 73 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 06 Scan requested (ret=0) - scan timeout 30 seconds nl80211: Event message available nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000057 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.652709 seconds nl80211: Received scan results (4 BSSes) wlp5s0: BSS: Start scan result update 8 BSS: last_scan_res_used=4/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP ac:b3:13:2b:90:60 type 0 added WPS: AP[0] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] ac:b3:13:2b:90:60 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55d58a2153c0 done in 3.657451 seconds wlp5s0: radio_work_free('scan'@0x55d58a2153c0): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-52 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 1: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-57 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 2: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-58 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: 3: ac:b3:13:2b:90:60 ssid='Diehl' wpa_ie_len=0 rsn_ie_len=20 caps=0xc11 level=-73 freq=2462 wps wlp5s0: skip - SSID mismatch wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-52 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55d58a252400 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55d58a2153c0 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55d58a2153c0 after 0.000031 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 PSK (set in config) - hexdump(len=32): [REMOVED] WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Event message available nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Event message available nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 60 31 00 00 02 00 00 00 dd 09 00 10 18 02 06 00 0c 00 00 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 06 00 0c 00 00 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Event message available nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 70 31 11 04 00 00 03 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 nl80211: Event message available nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 10 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found Get randomness: len=32 entropy=5 WPA: Renewed SNonce - hexdump(len=32): c4 b9 34 c3 5a 7a dd 4b e3 22 01 09 95 7c 36 68 22 4e 1c e0 ff 24 18 b7 c5 18 41 3b 02 d1 bb 1a WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): c4 b9 34 c3 5a 7a dd 4b e3 22 01 09 95 7c 36 68 22 4e 1c e0 ff 24 18 b7 c5 18 41 3b 02 d1 bb 1a WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 10 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 9d b5 31 52 ad 98 f8 f7 95 6c d2 ac 13 fa 02 6a WPA: TX EAPOL-Key - hexdump(len=127): 01 03 00 7b 02 01 0a 00 00 00 00 00 00 00 00 00 00 c4 b9 34 c3 5a 7a dd 4b e3 22 01 09 95 7c 36 68 22 4e 1c e0 ff 24 18 b7 c5 18 41 3b 02 d1 bb 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9d b5 31 52 ad 98 f8 f7 95 6c d2 ac 13 fa 02 6a 00 1c 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 10 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 11 51 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9f 98 ca 6d 36 0a 98 28 80 aa dd d0 39 b8 02 36 00 58 40 15 9e cc 68 f7 1e 64 43 2c 95 16 73 08 80 46 97 bc 25 7f db b6 92 52 ac df 35 bd c4 73 90 5e a8 9d 93 b1 e8 2d 69 07 0c 22 1a fd f5 96 d2 29 cd f0 00 fc 56 01 34 b5 50 49 ff f3 64 83 c1 e3 c2 c4 76 99 01 96 bb 7f 88 d5 3d 72 38 3e 4f 8b d5 67 1b fa d0 2b 46 a5 wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 WPA: RX EAPOL-Key - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 10 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 11 51 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9f 98 ca 6d 36 0a 98 28 80 aa dd d0 39 b8 02 36 00 58 40 15 9e cc 68 f7 1e 64 43 2c 95 16 73 08 80 46 97 bc 25 7f db b6 92 52 ac df 35 bd c4 73 90 5e a8 9d 93 b1 e8 2d 69 07 0c 22 1a fd f5 96 d2 29 cd f0 00 fc 56 01 34 b5 50 49 ff f3 64 83 c1 e3 c2 c4 76 99 01 96 bb 7f 88 d5 3d 72 38 3e 4f 8b d5 67 1b fa d0 2b 46 a5 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 10 key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 11 key_rsc - hexdump(len=8): 51 0a 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 9f 98 ca 6d 36 0a 98 28 80 aa dd d0 39 b8 02 36 WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): 40 15 9e cc 68 f7 1e 64 43 2c 95 16 73 08 80 46 97 bc 25 7f db b6 92 52 ac df 35 bd c4 73 90 5e a8 9d 93 b1 e8 2d 69 07 0c 22 1a fd f5 96 d2 29 cd f0 00 fc 56 01 34 b5 50 49 ff f3 64 83 c1 e3 c2 c4 76 99 01 96 bb 7f 88 d5 3d 72 38 3e 4f 8b d5 67 1b fa d0 2b 46 a5 WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): c1 b9 88 00 3b 0f 9c 32 52 27 2c b2 18 a4 64 9c WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c1 b9 88 00 3b 0f 9c 32 52 27 2c b2 18 a4 64 9c 00 00 wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d58a2133f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 51 0a 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d5889ec909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 51 0a 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55d58a2153c0 done in 0.047126 seconds wlp5s0: radio_work_free('sme-connect'@0x55d58a2153c0): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (4 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 9 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55d5889ec909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55d58a2114b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Event message available nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=d8:b6:b7:ee:fc:18 A2=40:e2:30:17:0e:e8 nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 d8 b6 b7 ee fc 18 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 00 00 01 00 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Event message available nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Event message available nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 6 wlp5s0: Add radio work 'scan'@0x55d58a243ed0 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55d58a243ed0 after 0.000021 second wait wlp5s0: nl80211: scan request nl80211: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] nl80211: Scan extra IEs - hexdump(len=136): 7f 08 00 00 00 00 01 00 00 40 dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 31 48 10 47 00 10 01 93 fa 7d 99 31 50 d9 84 5f 41 09 8e b2 6f 73 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 06 Scan requested (ret=0) - scan timeout 30 seconds nl80211: Event message available nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000034 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.660546 seconds nl80211: Received scan results (4 BSSes) wlp5s0: BSS: Start scan result update 10 BSS: last_scan_res_used=4/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP ac:b3:13:2b:90:60 type 0 added WPS: AP[0] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] ac:b3:13:2b:90:60 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55d58a243ed0 done in 3.665026 seconds wlp5s0: radio_work_free('scan'@0x55d58a243ed0): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 1: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-57 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 2: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-57 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: 3: ac:b3:13:2b:90:60 ssid='Diehl' wpa_ie_len=0 rsn_ie_len=20 caps=0xc11 level=-81 freq=2462 wps wlp5s0: skip - SSID mismatch wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55d58a252400 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55d58a243ed0 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55d58a243ed0 after 0.000022 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 PSK (set in config) - hexdump(len=32): [REMOVED] WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Event message available nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Event message available nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 70 34 00 00 02 00 00 00 dd 09 00 10 18 02 06 00 0c 00 00 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 06 00 0c 00 00 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Event message available nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 80 34 11 04 00 00 03 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 nl80211: Event message available nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 11 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found Get randomness: len=32 entropy=5 WPA: Renewed SNonce - hexdump(len=32): 06 2f 0b 81 99 4d c2 21 9a ff 13 17 97 d5 5e 9a 34 09 21 49 36 7e 16 29 41 91 04 92 1f 99 e7 be WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): 06 2f 0b 81 99 4d c2 21 9a ff 13 17 97 d5 5e 9a 34 09 21 49 36 7e 16 29 41 91 04 92 1f 99 e7 be WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 11 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): d7 ef 68 a6 48 84 4b 05 f9 10 e3 e5 c7 49 9d 52 WPA: TX EAPOL-Key - hexdump(len=127): 01 03 00 7b 02 01 0a 00 00 00 00 00 00 00 00 00 00 06 2f 0b 81 99 4d c2 21 9a ff 13 17 97 d5 5e 9a 34 09 21 49 36 7e 16 29 41 91 04 92 1f 99 e7 be 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d7 ef 68 a6 48 84 4b 05 f9 10 e3 e5 c7 49 9d 52 00 1c 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 11 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 12 55 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 f3 62 24 56 9a a7 85 27 31 98 50 9b 8f 88 37 00 58 e2 41 da 3d e5 bd 06 31 16 51 e6 0c 7d a9 72 27 7e 31 66 22 0e e0 93 9b 41 bc f4 56 6e 16 71 30 88 cd 8b dc 17 c8 fb a6 be 3b 1c f4 9a 98 45 aa 59 7b dd 9c e4 06 16 e4 62 70 18 8e 3e 44 8b 51 78 25 84 d6 47 e0 a7 a9 92 5e 18 02 e6 0f e7 78 4f 22 1a 07 69 b0 b6 0a wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 WPA: RX EAPOL-Key - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 11 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 12 55 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 f3 62 24 56 9a a7 85 27 31 98 50 9b 8f 88 37 00 58 e2 41 da 3d e5 bd 06 31 16 51 e6 0c 7d a9 72 27 7e 31 66 22 0e e0 93 9b 41 bc f4 56 6e 16 71 30 88 cd 8b dc 17 c8 fb a6 be 3b 1c f4 9a 98 45 aa 59 7b dd 9c e4 06 16 e4 62 70 18 8e 3e 44 8b 51 78 25 84 d6 47 e0 a7 a9 92 5e 18 02 e6 0f e7 78 4f 22 1a 07 69 b0 b6 0a wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 11 key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 12 key_rsc - hexdump(len=8): 55 0a 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 13 f3 62 24 56 9a a7 85 27 31 98 50 9b 8f 88 37 WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): e2 41 da 3d e5 bd 06 31 16 51 e6 0c 7d a9 72 27 7e 31 66 22 0e e0 93 9b 41 bc f4 56 6e 16 71 30 88 cd 8b dc 17 c8 fb a6 be 3b 1c f4 9a 98 45 aa 59 7b dd 9c e4 06 16 e4 62 70 18 8e 3e 44 8b 51 78 25 84 d6 47 e0 a7 a9 92 5e 18 02 e6 0f e7 78 4f 22 1a 07 69 b0 b6 0a WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): c0 38 39 ef 89 3d 96 64 ca 70 14 50 c9 85 b9 60 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 38 39 ef 89 3d 96 64 ca 70 14 50 c9 85 b9 60 00 00 wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d58a2133f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 55 0a 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d5889ec909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 55 0a 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55d58a243ed0 done in 0.046076 seconds wlp5s0: radio_work_free('sme-connect'@0x55d58a243ed0): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (4 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 11 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55d5889ec909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55d58a2114b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Event message available nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=d8:b6:b7:ee:fc:18 A2=40:e2:30:17:0e:e8 nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 d8 b6 b7 ee fc 18 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 00 00 01 00 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Event message available nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Event message available nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 6 wlp5s0: Add radio work 'scan'@0x55d58a253000 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55d58a253000 after 0.000023 second wait wlp5s0: nl80211: scan request nl80211: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] nl80211: Scan extra IEs - hexdump(len=136): 7f 08 00 00 00 00 01 00 00 40 dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 31 48 10 47 00 10 01 93 fa 7d 99 31 50 d9 84 5f 41 09 8e b2 6f 73 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 06 Scan requested (ret=0) - scan timeout 30 seconds nl80211: Event message available nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000069 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.648306 seconds nl80211: Received scan results (4 BSSes) wlp5s0: BSS: Start scan result update 12 BSS: last_scan_res_used=4/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP ac:b3:13:2b:90:60 type 0 added WPS: AP[0] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] ac:b3:13:2b:90:60 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55d58a253000 done in 3.653041 seconds wlp5s0: radio_work_free('scan'@0x55d58a253000): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-47 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 1: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-57 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 2: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-58 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: 3: ac:b3:13:2b:90:60 ssid='Diehl' wpa_ie_len=0 rsn_ie_len=20 caps=0xc11 level=-81 freq=2462 wps wlp5s0: skip - SSID mismatch wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-47 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55d58a252400 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55d58a253000 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55d58a253000 after 0.000034 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 PSK (set in config) - hexdump(len=32): [REMOVED] WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Event message available nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Event message available nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 f0 37 00 00 02 00 00 00 dd 09 00 10 18 02 06 00 0c 00 00 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 06 00 0c 00 00 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Event message available nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 00 38 11 04 00 00 03 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 nl80211: Event message available nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 12 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 12 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 12 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found Get randomness: len=32 entropy=5 WPA: Renewed SNonce - hexdump(len=32): e6 39 ee 63 72 db 4c 21 6c 80 59 f1 a4 19 8e 1a b6 d6 30 18 fc bd 07 8d 0d 82 f9 0e 28 6c c3 e4 WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): e6 39 ee 63 72 db 4c 21 6c 80 59 f1 a4 19 8e 1a b6 d6 30 18 fc bd 07 8d 0d 82 f9 0e 28 6c c3 e4 WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 12 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): f2 6c 52 7a 15 6e 44 29 c7 07 3c 5f 67 0f 12 93 WPA: TX EAPOL-Key - hexdump(len=127): 01 03 00 7b 02 01 0a 00 00 00 00 00 00 00 00 00 00 e6 39 ee 63 72 db 4c 21 6c 80 59 f1 a4 19 8e 1a b6 d6 30 18 fc bd 07 8d 0d 82 f9 0e 28 6c c3 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f2 6c 52 7a 15 6e 44 29 c7 07 3c 5f 67 0f 12 93 00 1c 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 12 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 13 5a 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ad 50 10 7a a1 0b 4c 9e 36 56 1f 57 de b3 c4 ce 00 58 13 1b ba 31 d2 c7 7e 35 7e ff 3b bb 93 ea 6b 49 f7 3c 57 39 83 b9 cf a5 03 90 97 c2 ec 95 8d d7 ab c5 c6 8c 7a 3d 9c e5 f1 f2 ab 2e a3 3f 17 39 c6 b6 56 18 60 4f 0d c3 be b4 49 d1 e4 4f 5d fb 5f c0 4e af d0 01 28 8b 95 af 7e 38 af 0d 80 56 24 4d 78 c7 3c a8 a6 d8 wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 WPA: RX EAPOL-Key - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 12 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 13 5a 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ad 50 10 7a a1 0b 4c 9e 36 56 1f 57 de b3 c4 ce 00 58 13 1b ba 31 d2 c7 7e 35 7e ff 3b bb 93 ea 6b 49 f7 3c 57 39 83 b9 cf a5 03 90 97 c2 ec 95 8d d7 ab c5 c6 8c 7a 3d 9c e5 f1 f2 ab 2e a3 3f 17 39 c6 b6 56 18 60 4f 0d c3 be b4 49 d1 e4 4f 5d fb 5f c0 4e af d0 01 28 8b 95 af 7e 38 af 0d 80 56 24 4d 78 c7 3c a8 a6 d8 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 12 key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 13 key_rsc - hexdump(len=8): 5a 0a 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): ad 50 10 7a a1 0b 4c 9e 36 56 1f 57 de b3 c4 ce WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): 13 1b ba 31 d2 c7 7e 35 7e ff 3b bb 93 ea 6b 49 f7 3c 57 39 83 b9 cf a5 03 90 97 c2 ec 95 8d d7 ab c5 c6 8c 7a 3d 9c e5 f1 f2 ab 2e a3 3f 17 39 c6 b6 56 18 60 4f 0d c3 be b4 49 d1 e4 4f 5d fb 5f c0 4e af d0 01 28 8b 95 af 7e 38 af 0d 80 56 24 4d 78 c7 3c a8 a6 d8 WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 02 e7 32 8a 64 4e b6 35 59 ed 6f 9d 8f 68 21 14 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 e7 32 8a 64 4e b6 35 59 ed 6f 9d 8f 68 21 14 00 00 wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d58a2133f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 5a 0a 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d5889ec909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 5a 0a 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55d58a253000 done in 0.058941 seconds wlp5s0: radio_work_free('sme-connect'@0x55d58a253000): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (4 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 13 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55d5889ec909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55d58a2114b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Event message available nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=d8:b6:b7:ee:fc:18 A2=40:e2:30:17:0e:e8 nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 d8 b6 b7 ee fc 18 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 00 00 01 00 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Event message available nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Event message available nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 6 wlp5s0: Add radio work 'scan'@0x55d58a210890 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55d58a210890 after 0.000023 second wait wlp5s0: nl80211: scan request nl80211: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] nl80211: Scan extra IEs - hexdump(len=136): 7f 08 00 00 00 00 01 00 00 40 dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 31 48 10 47 00 10 01 93 fa 7d 99 31 50 d9 84 5f 41 09 8e b2 6f 73 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 06 Scan requested (ret=0) - scan timeout 30 seconds nl80211: Event message available nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000069 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.632037 seconds nl80211: Received scan results (4 BSSes) wlp5s0: BSS: Start scan result update 14 BSS: last_scan_res_used=4/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP ac:b3:13:2b:90:60 type 0 added WPS: AP[0] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] ac:b3:13:2b:90:60 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55d58a210890 done in 3.636768 seconds wlp5s0: radio_work_free('scan'@0x55d58a210890): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-62 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 1: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-57 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 2: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-58 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: 3: ac:b3:13:2b:90:60 ssid='Diehl' wpa_ie_len=0 rsn_ie_len=20 caps=0xc11 level=-81 freq=2462 wps wlp5s0: skip - SSID mismatch wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-62 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55d58a252400 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55d58a210890 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55d58a210890 after 0.000033 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 PSK (set in config) - hexdump(len=32): [REMOVED] WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Event message available nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Event message available nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 70 3b 00 00 02 00 00 00 dd 09 00 10 18 02 06 00 0c 00 00 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 06 00 0c 00 00 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Event message available nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 80 3b 11 04 00 00 03 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 nl80211: Event message available nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 13 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found Get randomness: len=32 entropy=5 WPA: Renewed SNonce - hexdump(len=32): 12 f7 b1 c5 36 12 91 e6 8e 80 8d 10 19 b3 1b 70 39 01 9d 4c 8a 2d 77 bb 8b 3a c7 ba d9 ac 9e c5 WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): 12 f7 b1 c5 36 12 91 e6 8e 80 8d 10 19 b3 1b 70 39 01 9d 4c 8a 2d 77 bb 8b 3a c7 ba d9 ac 9e c5 WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 13 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 04 c2 e0 63 8f 85 f5 74 41 c5 6e 44 27 55 56 95 WPA: TX EAPOL-Key - hexdump(len=127): 01 03 00 7b 02 01 0a 00 00 00 00 00 00 00 00 00 00 12 f7 b1 c5 36 12 91 e6 8e 80 8d 10 19 b3 1b 70 39 01 9d 4c 8a 2d 77 bb 8b 3a c7 ba d9 ac 9e c5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 c2 e0 63 8f 85 f5 74 41 c5 6e 44 27 55 56 95 00 1c 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 13 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 14 60 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6a 06 be 9b ca 7b c4 38 0f 79 22 59 14 b2 32 cb 00 58 e7 8f bf 82 37 0d 2a 73 9e 35 59 82 8e 75 cb 79 c9 48 6f 29 1e f9 5a 77 30 c2 e0 56 71 0a 53 8f 7f 96 4b 6c 89 6a 03 7f 10 70 b0 52 84 7d 77 1d aa 57 a0 bc 68 bb ce 74 e0 38 fd b7 47 13 06 70 f5 64 d5 c3 fc 28 d4 bd 5e c7 e4 b0 28 1a ac ab 75 81 cc 9a 38 a0 ac 91 wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 WPA: RX EAPOL-Key - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 13 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 14 60 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6a 06 be 9b ca 7b c4 38 0f 79 22 59 14 b2 32 cb 00 58 e7 8f bf 82 37 0d 2a 73 9e 35 59 82 8e 75 cb 79 c9 48 6f 29 1e f9 5a 77 30 c2 e0 56 71 0a 53 8f 7f 96 4b 6c 89 6a 03 7f 10 70 b0 52 84 7d 77 1d aa 57 a0 bc 68 bb ce 74 e0 38 fd b7 47 13 06 70 f5 64 d5 c3 fc 28 d4 bd 5e c7 e4 b0 28 1a ac ab 75 81 cc 9a 38 a0 ac 91 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 13 key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 14 key_rsc - hexdump(len=8): 60 0a 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 6a 06 be 9b ca 7b c4 38 0f 79 22 59 14 b2 32 cb WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): e7 8f bf 82 37 0d 2a 73 9e 35 59 82 8e 75 cb 79 c9 48 6f 29 1e f9 5a 77 30 c2 e0 56 71 0a 53 8f 7f 96 4b 6c 89 6a 03 7f 10 70 b0 52 84 7d 77 1d aa 57 a0 bc 68 bb ce 74 e0 38 fd b7 47 13 06 70 f5 64 d5 c3 fc 28 d4 bd 5e c7 e4 b0 28 1a ac ab 75 81 cc 9a 38 a0 ac 91 WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): ad 1c 14 8b 23 5a 5f 2d 8a 14 48 c1 5f dd 39 79 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ad 1c 14 8b 23 5a 5f 2d 8a 14 48 c1 5f dd 39 79 00 00 wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d58a2133f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 60 0a 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d5889ec909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 60 0a 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55d58a210890 done in 0.044167 seconds wlp5s0: radio_work_free('sme-connect'@0x55d58a210890): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (4 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 15 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55d5889ec909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55d58a2114b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Event message available nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=d8:b6:b7:ee:fc:18 A2=40:e2:30:17:0e:e8 nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 d8 b6 b7 ee fc 18 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 00 00 01 00 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Event message available nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Event message available nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 6 wlp5s0: Add radio work 'scan'@0x55d58a254010 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55d58a254010 after 0.000025 second wait wlp5s0: nl80211: scan request nl80211: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] nl80211: Scan extra IEs - hexdump(len=136): 7f 08 00 00 00 00 01 00 00 40 dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 31 48 10 47 00 10 01 93 fa 7d 99 31 50 d9 84 5f 41 09 8e b2 6f 73 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 06 Scan requested (ret=0) - scan timeout 30 seconds nl80211: Event message available nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000100 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.631991 seconds nl80211: Received scan results (4 BSSes) wlp5s0: BSS: Start scan result update 16 BSS: last_scan_res_used=4/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP ac:b3:13:2b:90:60 type 0 added WPS: AP[0] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] ac:b3:13:2b:90:60 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55d58a254010 done in 3.636624 seconds wlp5s0: radio_work_free('scan'@0x55d58a254010): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 1: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-57 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 2: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-57 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: 3: ac:b3:13:2b:90:60 ssid='Diehl' wpa_ie_len=0 rsn_ie_len=20 caps=0xc11 level=-81 freq=2462 wps wlp5s0: skip - SSID mismatch wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55d58a252400 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55d58a254010 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55d58a254010 after 0.000014 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 PSK (set in config) - hexdump(len=32): [REMOVED] WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Event message available nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Event message available nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 a0 3e 00 00 02 00 00 00 dd 09 00 10 18 02 06 00 0c 00 00 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 06 00 0c 00 00 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Event message available nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 b0 3e 11 04 00 00 03 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 nl80211: Event message available nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 14 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found Get randomness: len=32 entropy=5 WPA: Renewed SNonce - hexdump(len=32): 46 d2 35 eb f9 43 e6 87 f0 00 dd 28 34 89 c1 1a 00 8c 09 5f ca 55 1f 98 50 b9 f8 54 5a 81 6b b6 WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): 46 d2 35 eb f9 43 e6 87 f0 00 dd 28 34 89 c1 1a 00 8c 09 5f ca 55 1f 98 50 b9 f8 54 5a 81 6b b6 WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 14 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 1a ce 0f 9b 8d c4 23 c6 e4 cd b7 da 00 9d 4c 4e WPA: TX EAPOL-Key - hexdump(len=127): 01 03 00 7b 02 01 0a 00 00 00 00 00 00 00 00 00 00 46 d2 35 eb f9 43 e6 87 f0 00 dd 28 34 89 c1 1a 00 8c 09 5f ca 55 1f 98 50 b9 f8 54 5a 81 6b b6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a ce 0f 9b 8d c4 23 c6 e4 cd b7 da 00 9d 4c 4e 00 1c 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 14 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 15 64 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9a 12 b4 a5 4a 08 28 d6 4f 94 d8 78 b2 f1 47 47 00 58 37 64 71 57 1d fd 7b a9 ee 74 5b 74 66 a0 05 a8 8b e8 71 d6 4d ed 3c a8 75 0a 2c 3d 1d e4 74 c1 4f 13 f0 59 d7 ea c9 cb a6 9e 50 96 5f 38 b6 58 c2 12 6e ba 9d e0 07 9b d8 3b 22 7f 82 bd 4d 15 04 a0 0b 2c 81 69 7f 86 85 b9 f2 be 72 03 ce 20 df 66 50 53 e2 60 9e 4a wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 WPA: RX EAPOL-Key - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 14 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 15 64 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9a 12 b4 a5 4a 08 28 d6 4f 94 d8 78 b2 f1 47 47 00 58 37 64 71 57 1d fd 7b a9 ee 74 5b 74 66 a0 05 a8 8b e8 71 d6 4d ed 3c a8 75 0a 2c 3d 1d e4 74 c1 4f 13 f0 59 d7 ea c9 cb a6 9e 50 96 5f 38 b6 58 c2 12 6e ba 9d e0 07 9b d8 3b 22 7f 82 bd 4d 15 04 a0 0b 2c 81 69 7f 86 85 b9 f2 be 72 03 ce 20 df 66 50 53 e2 60 9e 4a wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 14 key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 15 key_rsc - hexdump(len=8): 64 0a 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 9a 12 b4 a5 4a 08 28 d6 4f 94 d8 78 b2 f1 47 47 WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): 37 64 71 57 1d fd 7b a9 ee 74 5b 74 66 a0 05 a8 8b e8 71 d6 4d ed 3c a8 75 0a 2c 3d 1d e4 74 c1 4f 13 f0 59 d7 ea c9 cb a6 9e 50 96 5f 38 b6 58 c2 12 6e ba 9d e0 07 9b d8 3b 22 7f 82 bd 4d 15 04 a0 0b 2c 81 69 7f 86 85 b9 f2 be 72 03 ce 20 df 66 50 53 e2 60 9e 4a WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 76 f9 85 36 18 a3 26 58 5d 67 72 73 c8 c5 db e9 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 76 f9 85 36 18 a3 26 58 5d 67 72 73 c8 c5 db e9 00 00 wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d58a2133f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 64 0a 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d5889ec909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 64 0a 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55d58a254010 done in 0.067719 seconds wlp5s0: radio_work_free('sme-connect'@0x55d58a254010): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (4 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 17 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55d5889ec909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55d58a2114b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Event message available nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=d8:b6:b7:ee:fc:18 A2=40:e2:30:17:0e:e8 nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 d8 b6 b7 ee fc 18 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 00 00 01 00 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Event message available nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Event message available nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 6 wlp5s0: Add radio work 'scan'@0x55d58a243ed0 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55d58a243ed0 after 0.000030 second wait wlp5s0: nl80211: scan request nl80211: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] nl80211: Scan extra IEs - hexdump(len=136): 7f 08 00 00 00 00 01 00 00 40 dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 31 48 10 47 00 10 01 93 fa 7d 99 31 50 d9 84 5f 41 09 8e b2 6f 73 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 06 Scan requested (ret=0) - scan timeout 30 seconds nl80211: Event message available nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000085 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.651088 seconds nl80211: Received scan results (4 BSSes) wlp5s0: BSS: Start scan result update 18 BSS: last_scan_res_used=4/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP ac:b3:13:2b:90:60 type 0 added WPS: AP[0] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] ac:b3:13:2b:90:60 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55d58a243ed0 done in 3.655776 seconds wlp5s0: radio_work_free('scan'@0x55d58a243ed0): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-54 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 1: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-59 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 2: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-60 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: 3: ac:b3:13:2b:90:60 ssid='Diehl' wpa_ie_len=0 rsn_ie_len=20 caps=0xc11 level=-81 freq=2462 wps wlp5s0: skip - SSID mismatch wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-54 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55d58a252400 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55d58a243ed0 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55d58a243ed0 after 0.000028 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 PSK (set in config) - hexdump(len=32): [REMOVED] WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Event message available nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Event message available nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 c0 41 00 00 02 00 00 00 dd 09 00 10 18 02 06 00 0c 00 00 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 06 00 0c 00 00 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully nl80211: Event message available nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 d0 41 11 04 00 00 03 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Event message available nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 15 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found Get randomness: len=32 entropy=5 WPA: Renewed SNonce - hexdump(len=32): fd 47 f7 ed a3 de de ef 23 45 de 2a 82 a4 a5 02 8f 8f 2f 18 fe 69 ad 2d dd 9c 74 72 eb 57 e5 4d WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): fd 47 f7 ed a3 de de ef 23 45 de 2a 82 a4 a5 02 8f 8f 2f 18 fe 69 ad 2d dd 9c 74 72 eb 57 e5 4d WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 15 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 6b b2 ab 24 16 62 76 58 a8 f1 1f ee 99 6c ec 00 WPA: TX EAPOL-Key - hexdump(len=127): 01 03 00 7b 02 01 0a 00 00 00 00 00 00 00 00 00 00 fd 47 f7 ed a3 de de ef 23 45 de 2a 82 a4 a5 02 8f 8f 2f 18 fe 69 ad 2d dd 9c 74 72 eb 57 e5 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6b b2 ab 24 16 62 76 58 a8 f1 1f ee 99 6c ec 00 00 1c 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 15 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 16 69 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 73 26 91 55 29 58 52 e3 4c 59 07 9d 61 2b 22 57 00 58 6c 6c b7 0d 77 c3 8b 8b 37 bb 45 6a eb 62 29 11 d9 42 8e 51 2e 55 c3 b3 d7 a6 45 73 1d ea bd 91 56 24 d7 0b ed 6a 3a c0 e8 8b e5 b3 c4 41 85 f5 4b b5 be 11 c3 e5 9d 51 82 aa 9b 27 47 1d e8 88 1a e1 b0 47 b4 a1 7b 0b 17 2a 7f ac 70 ed 04 8b e9 08 03 a2 76 11 0a f4 wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 WPA: RX EAPOL-Key - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 15 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 16 69 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 73 26 91 55 29 58 52 e3 4c 59 07 9d 61 2b 22 57 00 58 6c 6c b7 0d 77 c3 8b 8b 37 bb 45 6a eb 62 29 11 d9 42 8e 51 2e 55 c3 b3 d7 a6 45 73 1d ea bd 91 56 24 d7 0b ed 6a 3a c0 e8 8b e5 b3 c4 41 85 f5 4b b5 be 11 c3 e5 9d 51 82 aa 9b 27 47 1d e8 88 1a e1 b0 47 b4 a1 7b 0b 17 2a 7f ac 70 ed 04 8b e9 08 03 a2 76 11 0a f4 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 15 key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 16 key_rsc - hexdump(len=8): 69 0a 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 73 26 91 55 29 58 52 e3 4c 59 07 9d 61 2b 22 57 WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): 6c 6c b7 0d 77 c3 8b 8b 37 bb 45 6a eb 62 29 11 d9 42 8e 51 2e 55 c3 b3 d7 a6 45 73 1d ea bd 91 56 24 d7 0b ed 6a 3a c0 e8 8b e5 b3 c4 41 85 f5 4b b5 be 11 c3 e5 9d 51 82 aa 9b 27 47 1d e8 88 1a e1 b0 47 b4 a1 7b 0b 17 2a 7f ac 70 ed 04 8b e9 08 03 a2 76 11 0a f4 WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 22 1f 47 4b 1e 78 bd 9f 4a c0 47 88 0f 4a 32 58 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 22 1f 47 4b 1e 78 bd 9f 4a c0 47 88 0f 4a 32 58 00 00 wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d58a2133f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 69 0a 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d5889ec909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 69 0a 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55d58a243ed0 done in 0.072143 seconds wlp5s0: radio_work_free('sme-connect'@0x55d58a243ed0): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (4 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 19 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55d5889ec909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55d58a2114b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Event message available nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=d8:b6:b7:ee:fc:18 A2=40:e2:30:17:0e:e8 nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 d8 b6 b7 ee fc 18 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 00 00 01 00 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Event message available nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Event message available nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 6 wlp5s0: Add radio work 'scan'@0x55d58a253000 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55d58a253000 after 0.000024 second wait wlp5s0: nl80211: scan request nl80211: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] nl80211: Scan extra IEs - hexdump(len=136): 7f 08 00 00 00 00 01 00 00 40 dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 31 48 10 47 00 10 01 93 fa 7d 99 31 50 d9 84 5f 41 09 8e b2 6f 73 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 06 Scan requested (ret=0) - scan timeout 30 seconds nl80211: Event message available nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000060 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.635410 seconds nl80211: Received scan results (4 BSSes) wlp5s0: BSS: Start scan result update 20 BSS: last_scan_res_used=4/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP ac:b3:13:2b:90:60 type 0 added WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP[0] ac:b3:13:2b:90:60 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55d58a253000 done in 3.640186 seconds wlp5s0: radio_work_free('scan'@0x55d58a253000): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-50 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 1: ac:b3:13:2b:90:60 ssid='Diehl' wpa_ie_len=0 rsn_ie_len=20 caps=0xc11 level=-45 freq=2462 wps wlp5s0: skip - SSID mismatch wlp5s0: 2: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-59 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 3: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-60 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-50 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55d58a252400 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55d58a253000 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55d58a253000 after 0.000027 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 PSK (set in config) - hexdump(len=32): [REMOVED] WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Event message available nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Event message available nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 b0 45 00 00 02 00 00 00 dd 09 00 10 18 02 06 00 0c 00 00 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 06 00 0c 00 00 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Event message available nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 c0 45 11 04 00 00 03 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 nl80211: Event message available nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 16 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found Get randomness: len=32 entropy=5 WPA: Renewed SNonce - hexdump(len=32): 09 c4 6b 1d 24 17 df 4e e1 3e 3b 3c 11 21 4e 4e 77 a9 73 6d b2 68 79 32 41 84 cd 46 a7 11 db 00 WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): 09 c4 6b 1d 24 17 df 4e e1 3e 3b 3c 11 21 4e 4e 77 a9 73 6d b2 68 79 32 41 84 cd 46 a7 11 db 00 WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 16 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): fa a3 3a c0 0b ad 7c fd 6f c7 71 9a 8b 8f 30 68 WPA: TX EAPOL-Key - hexdump(len=127): 01 03 00 7b 02 01 0a 00 00 00 00 00 00 00 00 00 00 09 c4 6b 1d 24 17 df 4e e1 3e 3b 3c 11 21 4e 4e 77 a9 73 6d b2 68 79 32 41 84 cd 46 a7 11 db 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fa a3 3a c0 0b ad 7c fd 6f c7 71 9a 8b 8f 30 68 00 1c 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 16 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 17 77 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 15 5b f9 38 08 62 08 0f e6 ff 23 bd 3e b4 e4 f6 00 58 6a 6d b3 74 e4 46 30 64 dd d4 8a 12 62 da 3b 66 83 b8 e6 40 0b 6b 81 c1 83 6a 87 40 a8 00 91 e3 26 0f c4 92 58 4e 81 04 22 88 ad 00 ba 7f 15 f7 d1 84 57 5b 6d d8 3d 90 3c 71 86 21 b4 b9 84 52 d9 11 e4 bf 35 e0 b2 18 cb cf a3 ae 71 57 95 b5 8a b9 fa 35 0d bd 38 5c wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 WPA: RX EAPOL-Key - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 16 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 17 77 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 15 5b f9 38 08 62 08 0f e6 ff 23 bd 3e b4 e4 f6 00 58 6a 6d b3 74 e4 46 30 64 dd d4 8a 12 62 da 3b 66 83 b8 e6 40 0b 6b 81 c1 83 6a 87 40 a8 00 91 e3 26 0f c4 92 58 4e 81 04 22 88 ad 00 ba 7f 15 f7 d1 84 57 5b 6d d8 3d 90 3c 71 86 21 b4 b9 84 52 d9 11 e4 bf 35 e0 b2 18 cb cf a3 ae 71 57 95 b5 8a b9 fa 35 0d bd 38 5c wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 16 key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 17 key_rsc - hexdump(len=8): 77 0a 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 15 5b f9 38 08 62 08 0f e6 ff 23 bd 3e b4 e4 f6 WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): 6a 6d b3 74 e4 46 30 64 dd d4 8a 12 62 da 3b 66 83 b8 e6 40 0b 6b 81 c1 83 6a 87 40 a8 00 91 e3 26 0f c4 92 58 4e 81 04 22 88 ad 00 ba 7f 15 f7 d1 84 57 5b 6d d8 3d 90 3c 71 86 21 b4 b9 84 52 d9 11 e4 bf 35 e0 b2 18 cb cf a3 ae 71 57 95 b5 8a b9 fa 35 0d bd 38 5c WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): c5 63 53 0f 95 8d 9a c2 28 7a b3 d3 2b 13 e9 8b WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c5 63 53 0f 95 8d 9a c2 28 7a b3 d3 2b 13 e9 8b 00 00 wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d58a2133f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 77 0a 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d5889ec909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 77 0a 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55d58a253000 done in 0.049675 seconds wlp5s0: radio_work_free('sme-connect'@0x55d58a253000): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (4 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 21 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55d5889ec909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55d58a2114b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 70 (NL80211_CMD_UNPROT_DEAUTHENTICATE) received for wlp5s0 nl80211: MLME event 70 (NL80211_CMD_UNPROT_DEAUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=26): c0 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 f0 45 07 00 nl80211: Unprot Deauthenticate event wlp5s0: Event UNPROT_DEAUTH (30) received Unprotected Deauthentication frame dropped: d8:b6:b7:ee:fc:18 -> 40:e2:30:17:0e:e8 (reason code 7) dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Event message available nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Event message available nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=d8:b6:b7:ee:fc:18 A2=40:e2:30:17:0e:e8 nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 d8 b6 b7 ee fc 18 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 00 00 01 00 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Event message available nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Event message available nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 6 wlp5s0: Add radio work 'scan'@0x55d58a254010 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55d58a254010 after 0.000010 second wait wlp5s0: nl80211: scan request nl80211: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] nl80211: Scan extra IEs - hexdump(len=136): 7f 08 00 00 00 00 01 00 00 40 dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 31 48 10 47 00 10 01 93 fa 7d 99 31 50 d9 84 5f 41 09 8e b2 6f 73 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 06 Scan requested (ret=0) - scan timeout 30 seconds nl80211: Event message available nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000041 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.641650 seconds nl80211: Received scan results (4 BSSes) wlp5s0: BSS: Start scan result update 22 BSS: last_scan_res_used=4/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP ac:b3:13:2b:90:60 type 0 added WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP[0] ac:b3:13:2b:90:60 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55d58a254010 done in 3.646178 seconds wlp5s0: radio_work_free('scan'@0x55d58a254010): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-55 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 1: ac:b3:13:2b:90:60 ssid='Diehl' wpa_ie_len=0 rsn_ie_len=20 caps=0xc11 level=-45 freq=2462 wps wlp5s0: skip - SSID mismatch wlp5s0: 2: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-56 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: 3: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-59 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-55 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55d58a252400 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55d58a254010 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55d58a254010 after 0.000050 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 PSK (set in config) - hexdump(len=32): [REMOVED] WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Event message available nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Event message available nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 e0 49 00 00 02 00 00 00 dd 09 00 10 18 02 06 00 0c 00 00 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 06 00 0c 00 00 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Event message available nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 f0 49 11 04 00 00 03 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 nl80211: Event message available nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 17 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found Get randomness: len=32 entropy=5 WPA: Renewed SNonce - hexdump(len=32): 71 3d b0 95 58 12 52 a9 9f 2a ae 58 4f eb a0 04 f5 4b e3 f4 c7 e7 88 e4 de bc f0 c8 c1 a1 19 0d WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): 71 3d b0 95 58 12 52 a9 9f 2a ae 58 4f eb a0 04 f5 4b e3 f4 c7 e7 88 e4 de bc f0 c8 c1 a1 19 0d WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 17 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): c1 96 ea c6 94 80 8b 82 89 e3 01 53 40 34 8b 61 WPA: TX EAPOL-Key - hexdump(len=127): 01 03 00 7b 02 01 0a 00 00 00 00 00 00 00 00 00 00 71 3d b0 95 58 12 52 a9 9f 2a ae 58 4f eb a0 04 f5 4b e3 f4 c7 e7 88 e4 de bc f0 c8 c1 a1 19 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c1 96 ea c6 94 80 8b 82 89 e3 01 53 40 34 8b 61 00 1c 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 17 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 18 85 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3b 6c 00 59 83 8b 1a 42 a8 ec 5a 34 f4 3c 7a b9 00 58 24 a0 62 1f 86 7d 1f 89 95 2b 52 fe 11 07 38 bf 15 5a 57 03 99 61 32 69 99 06 46 7b 73 fe d7 36 c4 97 be ea c0 62 71 ef c0 34 4d fa 1c 56 84 d5 08 b9 6c da 9d 7f 77 e6 47 f1 47 64 6e 2c 21 0c 4d a1 dc b9 4e f8 bb 04 96 f7 60 7a 1d 05 f7 fe d8 0c e8 8f db 35 3c 65 wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 WPA: RX EAPOL-Key - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 17 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 18 85 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3b 6c 00 59 83 8b 1a 42 a8 ec 5a 34 f4 3c 7a b9 00 58 24 a0 62 1f 86 7d 1f 89 95 2b 52 fe 11 07 38 bf 15 5a 57 03 99 61 32 69 99 06 46 7b 73 fe d7 36 c4 97 be ea c0 62 71 ef c0 34 4d fa 1c 56 84 d5 08 b9 6c da 9d 7f 77 e6 47 f1 47 64 6e 2c 21 0c 4d a1 dc b9 4e f8 bb 04 96 f7 60 7a 1d 05 f7 fe d8 0c e8 8f db 35 3c 65 wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 17 key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 18 key_rsc - hexdump(len=8): 85 0a 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 3b 6c 00 59 83 8b 1a 42 a8 ec 5a 34 f4 3c 7a b9 WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): 24 a0 62 1f 86 7d 1f 89 95 2b 52 fe 11 07 38 bf 15 5a 57 03 99 61 32 69 99 06 46 7b 73 fe d7 36 c4 97 be ea c0 62 71 ef c0 34 4d fa 1c 56 84 d5 08 b9 6c da 9d 7f 77 e6 47 f1 47 64 6e 2c 21 0c 4d a1 dc b9 4e f8 bb 04 96 f7 60 7a 1d 05 f7 fe d8 0c e8 8f db 35 3c 65 WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 7c 43 85 b8 d2 5c fb b2 16 e2 b7 e0 57 58 5e a1 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7c 43 85 b8 d2 5c fb b2 16 e2 b7 e0 57 58 5e a1 00 00 wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d58a2133f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 85 0a 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d5889ec909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 85 0a 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55d58a254010 done in 0.053758 seconds wlp5s0: radio_work_free('sme-connect'@0x55d58a254010): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (4 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 23 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55d5889ec909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55d58a2114b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Event message available nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=d8:b6:b7:ee:fc:18 A2=40:e2:30:17:0e:e8 nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 d8 b6 b7 ee fc 18 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 00 00 01 00 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Event message available nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Event message available nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 6 wlp5s0: Add radio work 'scan'@0x55d58a243ed0 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55d58a243ed0 after 0.000022 second wait wlp5s0: nl80211: scan request nl80211: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] nl80211: Scan extra IEs - hexdump(len=136): 7f 08 00 00 00 00 01 00 00 40 dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 31 48 10 47 00 10 01 93 fa 7d 99 31 50 d9 84 5f 41 09 8e b2 6f 73 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 06 Scan requested (ret=0) - scan timeout 30 seconds nl80211: Event message available nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000058 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp5s0 wlp5s0: nl80211: New scan results available nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received wlp5s0: Scan completed in 3.660490 seconds nl80211: Received scan results (4 BSSes) wlp5s0: BSS: Start scan result update 24 BSS: last_scan_res_used=4/32 wlp5s0: New scan results available (own=1 ext=0) WPS: AP ac:b3:13:2b:90:60 type 0 added WPS: AP da:31:34:e1:8b:79 type 0 added WPS: AP[0] ac:b3:13:2b:90:60 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] da:31:34:e1:8b:79 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlp5s0: Radio work 'scan'@0x55d58a243ed0 done in 3.665206 seconds wlp5s0: radio_work_free('scan'@0x55d58a243ed0): num_active_works --> 0 wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48 freq=2442 wlp5s0: skip - blacklisted (count=1 limit=0) wlp5s0: 1: ac:b3:13:2b:90:60 ssid='Diehl' wpa_ie_len=0 rsn_ie_len=20 caps=0xc11 level=-45 freq=2462 wps wlp5s0: skip - SSID mismatch wlp5s0: 2: da:31:34:e1:8b:79 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-56 freq=2442 wps p2p wlp5s0: skip - SSID not known wlp5s0: 3: da:31:34:e1:8b:79 ssid='DIRECT-roku-866-CE748F' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-57 freq=2442 wps p2p wlp5s0: skip - SSID mismatch wlp5s0: No APs found - clear blacklist and try again Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Selecting BSS from priority group 0 wlp5s0: 0: d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48 freq=2442 wlp5s0: selected based on RSN IE wlp5s0: selected BSS d8:b6:b7:ee:fc:18 ssid='Depeche Modem' wlp5s0: Considering connect request: reassociate: 0 selected: d8:b6:b7:ee:fc:18 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55d58a252400 current_ssid=(nil) wlp5s0: Request association with d8:b6:b7:ee:fc:18 wlp5s0: Re-association to the same ESS TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS wlp5s0: No ongoing scan/p2p-scan found to abort wlp5s0: Add radio work 'sme-connect'@0x55d58a243ed0 wlp5s0: First radio work item in the queue - schedule start immediately RSN: Ignored PMKID candidate without preauth flag wlp5s0: Starting radio work 'sme-connect'@0x55d58a243ed0 after 0.000036 second wait wlp5s0: WPA: clearing own WPA/RSN IE wlp5s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0 RSN: Search for BSSID d8:b6:b7:ee:fc:18 RSN: No PMKSA cache entry found wlp5s0: RSN: using IEEE 802.11i/D9.0 wlp5s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlp5s0: WPA: Selected mgmt group cipher 32 wlp5s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 wlp5s0: WPA: using GTK CCMP wlp5s0: WPA: using PTK CCMP wlp5s0: WPA: using KEY_MGMT WPA-PSK wlp5s0: WPA: using MGMT group cipher AES-128-CMAC WPA: Set own WPA IE default - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 PSK (set in config) - hexdump(len=32): [REMOVED] WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: SME: Selected AP supports MFP: require MFP RRM: Determining whether RRM can be used - device support: 0x10 RRM: No RRM in network Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto wlp5s0: Cancelling scan request wlp5s0: SME: Trying to authenticate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) EAPOL: External notification - portValid=0 wlp5s0: State: SCANNING -> AUTHENTICATING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration nl80211: Authenticate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Event message available nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp5s0 nl80211: New station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 nl80211: Event message available nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp5s0 nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 50 4d 00 00 02 00 00 00 dd 09 00 10 18 02 06 00 0c 00 00 nl80211: Authenticate event wlp5s0: Event AUTH (10) received wlp5s0: SME: Authentication response: peer=d8:b6:b7:ee:fc:18 auth_type=0 auth_transaction=2 status_code=0 SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 06 00 0c 00 00 SME: Association Request IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f wlp5s0: set_disable_max_amsdu: -1 wlp5s0: set_ampdu_factor: -1 wlp5s0: set_ampdu_density: -1 wlp5s0: set_disable_ht40: 0 wlp5s0: set_disable_sgi: 0 wlp5s0: set_disable_ldpc: 0 wlp5s0: set_rx_stbc: -1 wlp5s0: set_tx_stbc: -1 wlp5s0: Trying to associate with d8:b6:b7:ee:fc:18 (SSID='Depeche Modem' freq=2442 MHz) wlp5s0: State: AUTHENTICATING -> ASSOCIATING nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: WPA: set own WPA/RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 nl80211: Associate (ifindex=3) * bssid=d8:b6:b7:ee:fc:18 * freq=2442 * SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem * IEs - hexdump(len=57): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 7f 08 00 00 00 00 01 00 00 40 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f * WPA Versions 0x2 * pairwise=0xfac04 * group=0xfac04 * akm=0xfac02 * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 nl80211: Association request send successfully RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Event message available nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp5s0 nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp5s0(40:e2:30:17:0e:e8) A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 d8 b6 b7 ee fc 18 60 4d 11 04 00 00 03 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 nl80211: Associate event nl80211: Associated on 2442 MHz nl80211: Associated with d8:b6:b7:ee:fc:18 nl80211: Set drv->ssid based on scan res info to 'Depeche Modem' wlp5s0: Event ASSOC (0) received wlp5s0: Association info event resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 07 0d 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 09 00 10 18 02 06 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlp5s0: freq=2442 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlp5s0: State: ASSOCIATING -> ASSOCIATED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Associated to a new BSS: BSSID=d8:b6:b7:ee:fc:18 wlp5s0: Associated with d8:b6:b7:ee:fc:18 wlp5s0: WPA: Association event - clear replay counter wlp5s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: Cancelling scan request WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 WMM AC: U-APSD queues=0x0 WMM AC: Valid WMM association, WMM AC is enabled wlp5s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 nl80211: Event message available nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp5s0 nl80211: Ignore connect event (cmd=46) when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=121 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: Setting authentication timeout: 10 sec 0 usec wlp5s0: IEEE 802.1X RX: version=2 type=3 length=117 WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlp5s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 18 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlp5s0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: WPA: RX message 1 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc RSN: PMKID from Authenticator - hexdump(len=16): cf 9a 1a bc 28 95 66 6f 0e 43 73 ca ab 80 fe bc wlp5s0: RSN: no matching PMKID found Get randomness: len=32 entropy=5 WPA: Renewed SNonce - hexdump(len=32): 32 57 4c 5a 66 0b 22 34 a5 5c 03 ca 49 e8 df ec a9 5f 29 a3 34 9e af 35 96 b4 a4 e7 0e 32 29 13 WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=40:e2:30:17:0e:e8 A2=d8:b6:b7:ee:fc:18 WPA: Nonce1 - hexdump(len=32): 32 57 4c 5a 66 0b 22 34 a5 5c 03 ca 49 e8 df ec a9 5f 29 a3 34 9e af 35 96 b4 a4 e7 0e 32 29 13 WPA: Nonce2 - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 18 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlp5s0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 74 28 4a 19 67 bc da 90 f0 4b b5 03 b4 84 39 b3 WPA: TX EAPOL-Key - hexdump(len=127): 01 03 00 7b 02 01 0a 00 00 00 00 00 00 00 00 00 00 32 57 4c 5a 66 0b 22 34 a5 5c 03 ca 49 e8 df ec a9 5f 29 a3 34 9e af 35 96 b4 a4 e7 0e 32 29 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 74 28 4a 19 67 bc da 90 f0 4b b5 03 b4 84 39 b3 00 1c 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 80 00 00 00 00 0f ac 06 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 l2_packet_receive: src=d8:b6:b7:ee:fc:18 len=187 wlp5s0: RX EAPOL from d8:b6:b7:ee:fc:18 RX EAPOL - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 18 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 19 8c 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc 68 b5 55 43 c8 41 0e db bf 4a f8 d0 7e 68 71 00 58 fd e0 eb 38 2e 60 47 17 20 e0 d9 a1 94 2f 13 52 e8 a8 21 03 52 52 0f 4c 9e a1 c1 16 83 e5 2f e2 25 b7 29 12 ab 57 0a cb a0 2e 72 64 3c 7c a8 f3 ff 9c a2 35 93 3a 57 58 6d aa f1 af 1b c5 ae e2 b0 f6 fb eb 24 0a 53 47 41 70 a5 b3 51 5c ec d9 a0 31 12 17 85 91 0a 5f wlp5s0: IEEE 802.1X RX: version=2 type=3 length=183 WPA: RX EAPOL-Key - hexdump(len=187): 02 03 00 b7 02 13 ca 00 10 00 00 00 00 00 00 00 01 cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 18 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 19 8c 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc 68 b5 55 43 c8 41 0e db bf 4a f8 d0 7e 68 71 00 58 fd e0 eb 38 2e 60 47 17 20 e0 d9 a1 94 2f 13 52 e8 a8 21 03 52 52 0f 4c 9e a1 c1 16 83 e5 2f e2 25 b7 29 12 ab 57 0a cb a0 2e 72 64 3c 7c a8 f3 ff 9c a2 35 93 3a 57 58 6d aa f1 af 1b c5 ae e2 b0 f6 fb eb 24 0a 53 47 41 70 a5 b3 51 5c ec d9 a0 31 12 17 85 91 0a 5f wlp5s0: EAPOL-Key type=2 wlp5s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlp5s0: key_length=16 key_data_length=88 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): cb a6 64 da f8 a5 c4 ae 1f 1c 4c 5c 35 52 6c b7 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 18 key_iv - hexdump(len=16): 8d dc 7c a9 a4 28 4d de 10 7e 75 49 bd f9 fa 19 key_rsc - hexdump(len=8): 8c 0a 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): fc 68 b5 55 43 c8 41 0e db bf 4a f8 d0 7e 68 71 WPA: EAPOL-Key MIC using HMAC-SHA1 RSN: encrypted key data - hexdump(len=88): fd e0 eb 38 2e 60 47 17 20 e0 d9 a1 94 2f 13 52 e8 a8 21 03 52 52 0f 4c 9e a1 c1 16 83 e5 2f e2 25 b7 29 12 ab 57 0a cb a0 2e 72 64 3c 7c a8 f3 ff 9c a2 35 93 3a 57 58 6d aa f1 af 1b c5 ae e2 b0 f6 fb eb 24 0a 53 47 41 70 a5 b3 51 5c ec d9 a0 31 12 17 85 91 0a 5f WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16) WPA: decrypted EAPOL-Key key data - hexdump(len=80): [REMOVED] wlp5s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlp5s0: WPA: RX message 3 of 4-Way Handshake from d8:b6:b7:ee:fc:18 (ver=2) WPA: IE KeyData - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 dd 16 00 0f ac 01 02 00 82 f6 1f c8 1c 36 2a 92 32 b2 d5 2f 3c e6 70 a9 dd 1c 00 0f ac 09 00 04 d0 ca a8 2e 44 b2 97 c8 5c dd 15 c8 fc 45 0e 39 f8 4b e9 57 82 fd dd 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: IGTK in EAPOL-Key - hexdump(len=30): [REMOVED] wlp5s0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to d8:b6:b7:ee:fc:18 ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): af c4 dd e0 b0 d8 41 f2 a7 be 4a 45 e4 95 9b 76 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 af c4 dd e0 b0 d8 41 f2 a7 be 4a 45 e4 95 9b 76 00 00 wlp5s0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d58a2133f8 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=d8:b6:b7:ee:fc:18 EAPOL: External notification - portValid=1 wlp5s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlp5s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 8c 0a 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=3 addr=0x55d5889ec909 key_idx=2 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 8c 0a 00 00 00 00 broadcast key wlp5s0: WPA: Key negotiation completed with d8:b6:b7:ee:fc:18 [PTK=CCMP GTK=CCMP] wlp5s0: Cancelling authentication timeout wlp5s0: State: GROUP_HANDSHAKE -> COMPLETED wlp5s0: Radio work 'sme-connect'@0x55d58a243ed0 done in 0.058909 seconds wlp5s0: radio_work_free('sme-connect'@0x55d58a243ed0): num_active_works --> 0 wlp5s0: CTRL-EVENT-CONNECTED - Connection to d8:b6:b7:ee:fc:18 completed [id=0 id_str=] nl80211: Set wlp5s0 operstate 0->1 (UP) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) bgscan simple: Signal strength threshold -80 Short bgscan interval 30 Long bgscan interval 86400 nl80211: Signal monitor threshold=-80 hysteresis=4 bgscan simple: Init scan interval: 86400 bgscan: Initialized module 'simple' with parameters '30:-80:86400' nl80211: Received scan results (4 BSSes) nl80211: Scan results indicate BSS status with d8:b6:b7:ee:fc:18 as associated wlp5s0: BSS: Start scan result update 25 bgscan simple: scan result notification wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=1): completed iteration wlp5s0: freq[0]: 2442, flags=0x1 P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for d8:b6:b7:ee:fc:18 EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS wlp5s0: WPA: IGTK keyid 1024 pn d0caa82e44b2 WPA: IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=4 addr=0x55d5889ec909 key_idx=1024 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): d0 ca a8 2e 44 b2 broadcast key nl80211: set_key failed; err=-22 Invalid argument) wlp5s0: WPA: Failed to configure IGTK to the driver wlp5s0: RSN: Failed to configure IGTK wlp5s0: Request to deauthenticate - bssid=d8:b6:b7:ee:fc:18 pending_bssid=00:00:00:00:00:00 reason=1 state=COMPLETED TDLS: Tear down peers wpa_driver_nl80211_deauthenticate(addr=d8:b6:b7:ee:fc:18 reason_code=1) wlp5s0: Event DEAUTH (11) received wlp5s0: Deauthentication notification wlp5s0: * reason 1 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlp5s0: CTRL-EVENT-DISCONNECTED bssid=d8:b6:b7:ee:fc:18 reason=1 locally_generated=1 wlp5s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9) wlp5s0: Setting scan request: 0.100000 sec Added BSSID d8:b6:b7:ee:fc:18 into blacklist wlp5s0: Blacklist count 1 --> request scan in 100 ms wlp5s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation wlp5s0: WPA: Clear old PMK and PTK wlp5s0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 (wlp5s0) alg=0 addr=0x55d58a2114b8 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=d8:b6:b7:ee:fc:18 nl80211: Data frame filter flags=0x0 dbus: wpa_dbus_property_changed: no property SessionLength in object /fi/w1/wpa_supplicant1/Interfaces/1 wlp5s0: State: COMPLETED -> DISCONNECTED nl80211: Set wlp5s0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) bgscan: Deinitializing module 'simple' nl80211: Signal monitor threshold=0 hysteresis=0 WMM AC: WMM AC is disabled wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 nl80211: Data frame filter flags=0x0 wlp5s0: State: DISCONNECTED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Event message available nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp5s0 nl80211: Delete station d8:b6:b7:ee:fc:18 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 nl80211: Event message available nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp5s0 nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp5s0(40:e2:30:17:0e:e8) A1=d8:b6:b7:ee:fc:18 A2=40:e2:30:17:0e:e8 nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 d8 b6 b7 ee fc 18 40 e2 30 17 0e e8 d8 b6 b7 ee fc 18 00 00 01 00 nl80211: Deauthenticate event nl80211: Ignore deauth event triggered due to own deauth request dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 nl80211: Event message available nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp5s0 nl80211: Ignore disconnect event when using userspace SME dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 nl80211: Event message available nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp5s0 nl80211: Regulatory domain change * initiator=0 * type=1 wlp5s0: Event CHANNEL_LIST_CHANGED (27) received wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD wlp5s0: Updating hw mode nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED] wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: State: DISCONNECTED -> SCANNING wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem wlp5s0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (3148) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=25 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 6 wlp5s0: Add radio work 'scan'@0x55d58a243ed0 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55d58a243ed0 after 0.000006 second wait wlp5s0: nl80211: scan request nl80211: Scan SSID - hexdump_ascii(len=13): 44 65 70 65 63 68 65 20 4d 6f 64 65 6d Depeche Modem nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] nl80211: Scan extra IEs - hexdump(len=136): 7f 08 00 00 00 00 01 00 00 40 dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 31 48 10 47 00 10 01 93 fa 7d 99 31 50 d9 84 5f 41 09 8e b2 6f 73 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 06 Scan requested (ret=0) - scan timeout 30 seconds nl80211: Event message available nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000020 seconds dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1002 () nl80211: Interface down (wlp5s0/wlp5s0) wlp5s0: Event INTERFACE_DISABLED (26) received wlp5s0: Interface was disabled nl80211: Data frame filter flags=0x0 wlp5s0: State: SCANNING -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: BSS: Remove id 3 BSSID d8:b6:b7:ee:fc:18 SSID 'Depeche Modem' due to wpa_bss_flush dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3' wlp5s0: BSS: Remove id 6 BSSID ac:b3:13:2b:90:60 SSID 'Diehl' due to wpa_bss_flush dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6' wlp5s0: BSS: Remove id 5 BSSID da:31:34:e1:8b:79 SSID '' due to wpa_bss_flush dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5' wlp5s0: BSS: Remove id 4 BSSID da:31:34:e1:8b:79 SSID 'DIRECT-roku-866-CE748F' due to wpa_bss_flush dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4' wlp5s0: Remove radio work 'scan'@0x55d58a243ed0 (started) wlp5s0: radio_work_free('scan'@0x55d58a243ed0): num_active_works --> 0 wlp5s0: State: DISCONNECTED -> INTERFACE_DISABLED wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1002 () nl80211: Event message available nl80211: Drv Event 35 (NL80211_CMD_SCAN_ABORTED) received for wlp5s0 wlp5s0: nl80211: Scan aborted nl80211: Scan probed for SSID 'Depeche Modem' nl80211: Scan probed for SSID '' nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825 wlp5s0: Event SCAN_RESULTS (3) received l2_packet_receive - recvfrom: Network is down l2_packet_receive - recvfrom: Network is down dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' RTM_NEWLINK: ifi_index=3 ifname=wlp5s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Interface up (wlp5s0/wlp5s0) nl80211: Own MAC address on ifindex 3 (wlp5s0) changed from 40:e2:30:17:0e:e8 to 4e:23:44:12:26:61 wlp5s0: Event INTERFACE_ENABLED (25) received wlp5s0: Interface was enabled wlp5s0: State: INTERFACE_DISABLED -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: wlp5s0: Setting scan request: 0.000000 sec wlp5s0: No enabled networks - do not scan wlp5s0: State: DISCONNECTED -> INACTIVE wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] wlp5s0: Add radio work 'scan'@0x55d58a244a20 wlp5s0: First radio work item in the queue - schedule start immediately wlp5s0: Starting radio work 'scan'@0x55d58a244a20 after 0.000042 second wait Request driver to clear scan cache due to local BSS flush wlp5s0: nl80211: scan request nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] nl80211: Add NL80211_SCAN_FLAG_FLUSH Scan requested (ret=0) - scan timeout 30 seconds dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] wlp5s0: Reject scan trigger since one is already pending nl80211: Event message available nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp5s0 wlp5s0: nl80211: Scan trigger wlp5s0: Event SCAN_STARTED (46) received wlp5s0: Own scan request started a scan in 0.000174 seconds wlp5s0: Removing interface wlp5s0 wlp5s0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=INACTIVE TDLS: Tear down peers nl80211: Data frame filter flags=0x0 wlp5s0: State: INACTIVE -> DISCONNECTED nl80211: Set wlp5s0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) wlp5s0: Determining shared radio frequencies (max len 1) wlp5s0: Shared frequencies (len=0): completed iteration P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b P2P: Update channel list P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 P2P: cli_channels: EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wlp5s0: WPA: Clear old PMK and PTK Removed BSSID d8:b6:b7:ee:fc:18 from blacklist (clear) wlp5s0: Cancelling scan request wlp5s0: Cancelling authentication timeout Off-channel: Clear pending Action frame TX (pending_action_tx=(nil) nl80211: Data frame filter flags=0x0 HS20: Delete all stored icons Off-channel: Action frame sequence done notification: pending_action_tx=(nil) drv_offchan_tx=1 action_tx_wait_time=0 off_channel_freq=0 roc_waiting_drv_freq=0 wlp5s0: P2P: Disable P2P since removing the management interface is being removed P2P: All ASP advertisements flushed P2P: Disabling Extended Listen Timing P2P: Stopping find P2P: Clear timeout (state=IDLE) P2P: State IDLE -> IDLE P2P: All ASP advertisements flushed Remove interface wlp5s0 from radio phy0 wlp5s0: Remove radio work 'scan'@0x55d58a244a20 (started) wlp5s0: radio_work_free('scan'@0x55d58a244a20): num_active_works --> 0 Remove radio phy0 nl80211: deinit ifname=wlp5s0 disabled_11b_rates=0 nl80211: Remove monitor interface: refcount=0 netlink: Operstate: ifindex=3 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) nl80211: Set mode ifindex 3 iftype 2 (STATION) nl80211: Unsubscribe mgmt frames handle 0x8888dd5d02a9c979 (mode change) dbus: Unregister interface object '/fi/w1/wpa_supplicant1/Interfaces/1' wlp5s0: CTRL-EVENT-TERMINATING dbus: Unregister D-Bus object '/fi/w1/wpa_supplicant1'
_______________________________________________ Hostap mailing list Hostap@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/hostap