Search Linux Wireless

Re: AR9462 problems connecting again..

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sun, Feb 22, 2015 at 4:54 PM, Adrian Chadd <adrian@xxxxxxxxxxx> wrote:
>
> I /think/ it's okay? The removed stuff is the pre-shared key pieces.

Ok. Attached is what seems to be the relevant part of the
wpa_supplicant.log file.

The datestamp has been changed so that it can be matched up with the
dmesg, and I added empty lines for pauses when I was trying to figure
out what the heck it was doing, but other than that it's the raw log.

> Do you have another laptop with an atheros NIC in it that you could
> use in monitor mode to capture all the frames?

Nope, everything else I have seems to be intel wireless. I think one
of the kids machines is a Mac Mini with an ath5k thing, but I'm hoping
the wpa_supplicant.log is sufficient to give somebody an idea.

                            Linus
14:07:10.971480: EAPOL: disable timer tick
14:07:10.971578: EAPOL: Supplicant port status: Unauthorized


14:07:12.886125: nl80211: Event message available
14:07:12.886287: nl80211: Regulatory beacon hint
14:07:12.886318: wlp1s0: Event CHANNEL_LIST_CHANGED (31) received
14:07:12.886608: nl80211: Regulatory information - country=US
14:07:12.886646: nl80211: 2402-2472 @ 40 MHz
14:07:12.886670: nl80211: 5170-5250 @ 80 MHz
14:07:12.886691: nl80211: 5250-5330 @ 80 MHz
14:07:12.886711: nl80211: 5490-5600 @ 80 MHz
14:07:12.886733: nl80211: 5650-5710 @ 40 MHz
14:07:12.886755: nl80211: 5735-5835 @ 80 MHz
14:07:12.886777: nl80211: 57240-63720 @ 2160 MHz
14:07:12.886822: nl80211: Added 802.11b mode based on 802.11g information
14:07:12.886848: P2P: Add operating class 81
14:07:12.886870: P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
14:07:12.886902: P2P: Add operating class 124
14:07:12.886921: P2P: Channels - hexdump(len=1): a1
14:07:12.886948: wlp1s0: P2P: Update channel list

14:07:13.011791: nl80211: Event message available
14:07:13.011987: nl80211: New scan results available
14:07:13.012055: wlp1s0: Event SCAN_RESULTS (3) received
14:07:13.012281: nl80211: Received scan results (3 BSSes)
14:07:13.012464: wlp1s0: BSS: Start scan result update 1
14:07:13.012501: wlp1s0: BSS: Add new id 0 BSSID 60:a4:4c:8d:99:24 SSID '1gnoraNT'
14:07:13.012530: dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/7/BSSs/0'
14:07:13.012745: wlp1s0: BSS: Add new id 1 BSSID 60:a4:4c:8d:99:20 SSID '1gnoraNT'
14:07:13.012767: dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/7/BSSs/1'
14:07:13.012905: wlp1s0: BSS: Add new id 2 BSSID 20:9f:db:e7:80:80 SSID 'UniFi-home'
14:07:13.012925: dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/7/BSSs/2'
14:07:13.013080: BSS: last_scan_res_used=3/32 last_scan_full=0
14:07:13.013115: wlp1s0: New scan results available
14:07:13.013191: wlp1s0: No suitable network found
14:07:13.013209: wlp1s0: Short-circuit new scan request since there are no enabled networks
14:07:13.013221: wlp1s0: State: DISCONNECTED -> INACTIVE
14:07:13.013272: wlp1s0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
14:07:13.014248: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
14:07:13.014265: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp1s0' added
14:07:13.014412: nl80211: if_removed already cleared - ignore event
14:07:13.017250: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/7

14:07:13.060305: dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/7/Networks/0'

14:07:13.072845: wlp1s0: Setting scan request: 0 sec 0 usec
14:07:13.073000: wlp1s0: State: INACTIVE -> SCANNING
14:07:13.073054: Scan SSID - hexdump_ascii(len=10):
     55 6e 69 46 69 2d 68 6f 6d 65                     UniFi-home      
14:07:13.073078: wlp1s0: Starting AP scan for wildcard SSID
14:07:13.073088: WPS: Building WPS IE for Probe Request
14:07:13.073096: WPS:  * Version (hardcoded 0x10)
14:07:13.073104: WPS:  * Request Type
14:07:13.073111: WPS:  * Config Methods (108)
14:07:13.073129: WPS:  * UUID-E
14:07:13.073137: WPS:  * Primary Device Type
14:07:13.073145: WPS:  * RF Bands (3)
14:07:13.073153: WPS:  * Association State
14:07:13.073160: WPS:  * Configuration Error (0)
14:07:13.073167: WPS:  * Device Password ID (0)
14:07:13.073175: WPS:  * Device Name
14:07:13.073184: P2P: * P2P IE header
14:07:13.073192: P2P: * Capability dev=25 group=00
14:07:13.073200: P2P: * Listen Channel: Regulatory Class 81 Channel 1
14:07:13.077659: Scan requested (ret=0) - scan timeout 30 seconds
14:07:13.077697: nl80211: Event message available
14:07:13.077716: nl80211: Scan trigger
14:07:13.078248: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/7


14:07:16.056351: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
14:07:16.056498: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp1s0' added
14:07:16.056652: nl80211: if_removed already cleared - ignore event
14:07:16.056728: nl80211: Event message available
14:07:16.056810: nl80211: New scan results available
14:07:16.056879: wlp1s0: Event SCAN_RESULTS (3) received
14:07:16.057386: nl80211: Received scan results (3 BSSes)
14:07:16.057735: wlp1s0: BSS: Start scan result update 2
14:07:16.057828: BSS: last_scan_res_used=3/32 last_scan_full=0
14:07:16.057870: wlp1s0: New scan results available
14:07:16.058086: wlp1s0: Selecting BSS from priority group 0
14:07:16.058181: wlp1s0: 0: 60:a4:4c:8d:99:24 ssid='1gnoraNT' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-20
14:07:16.058237: wlp1s0:    skip - SSID mismatch
14:07:16.058298: wlp1s0: 1: 60:a4:4c:8d:99:20 ssid='1gnoraNT' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=37
14:07:16.058348: wlp1s0:    skip - SSID mismatch
14:07:16.058379: wlp1s0: 2: 20:9f:db:e7:80:80 ssid='UniFi-home' wpa_ie_len=0 rsn_ie_len=20 caps=0x431 level=-68
14:07:16.058404: wlp1s0:    selected based on RSN IE
14:07:16.058445: wlp1s0:    selected BSS 20:9f:db:e7:80:80 ssid='UniFi-home'
14:07:16.058471: wlp1s0: Request association: reassociate: 1  selected: 20:9f:db:e7:80:80  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING
14:07:16.058496: wlp1s0: Automatic auth_alg selection: 0x1
14:07:16.058515: RSN: PMKSA cache search - network_ctx=0x7f0ab41bf340 try_opportunistic=0
14:07:16.058533: RSN: Search for BSSID 20:9f:db:e7:80:80
14:07:16.058550: RSN: No PMKSA cache entry found
14:07:16.058568: wlp1s0: RSN: using IEEE 802.11i/D9.0
14:07:16.058589: wlp1s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
14:07:16.058607: wlp1s0: WPA: clearing AP WPA IE
14:07:16.058628: WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
14:07:16.058660: wlp1s0: WPA: using GTK CCMP
14:07:16.058680: wlp1s0: WPA: using PTK CCMP
14:07:16.058697: wlp1s0: WPA: using KEY_MGMT WPA-PSK
14:07:16.058715: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
14:07:16.058764: wlp1s0: Cancelling scan request
14:07:16.058793: wlp1s0: SME: Trying to authenticate with 20:9f:db:e7:80:80 (SSID='UniFi-home' freq=2462 MHz)
14:07:16.058815: wlp1s0: No keys have been configured - skip key clearing
14:07:16.058844: wlp1s0: State: SCANNING -> AUTHENTICATING
14:07:16.058961: EAPOL: External notification - EAP success=0
14:07:16.058998: EAPOL: Supplicant port status: Unauthorized
14:07:16.059166: EAPOL: External notification - EAP fail=0
14:07:16.059202: EAPOL: Supplicant port status: Unauthorized
14:07:16.059283: EAPOL: External notification - portControl=Auto
14:07:16.059312: EAPOL: Supplicant port status: Unauthorized
14:07:16.059389: nl80211: Authenticate (ifindex=3)
14:07:16.059418:   * bssid=20:9f:db:e7:80:80
14:07:16.059441:   * freq=2462
14:07:16.059466:   * SSID - hexdump_ascii(len=10):
     55 6e 69 46 69 2d 68 6f 6d 65                     UniFi-home      
14:07:16.059506:   * IEs - hexdump(len=0): [NULL]
14:07:16.059525:   * Auth Type 0

14:07:16.071731: nl80211: Authentication request send successfully
14:07:16.071811: RSN: Ignored PMKID candidate without preauth flag
14:07:16.071859: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/7
14:07:16.072060: nl80211: Event message available
14:07:16.072097: nl80211: New station 20:9f:db:e7:80:80
14:07:16.072121: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/7/BSSs/0
14:07:16.072218: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/7/BSSs/1
14:07:16.072307: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/7/BSSs/2

14:07:16.384167: nl80211: Event message available
14:07:16.384298: nl80211: Delete station 20:9f:db:e7:80:80
14:07:16.390554: nl80211: Event message available
14:07:16.390659: nl80211: MLME event 37; timeout with 20:9f:db:e7:80:80
14:07:16.390702: wlp1s0: Event AUTH_TIMED_OUT (14) received
14:07:16.390739: wlp1s0: SME: Authentication timed out
14:07:16.390759: Added BSSID 20:9f:db:e7:80:80 into blacklist
14:07:16.390781: wlp1s0: Blacklist count 1 --> request scan in 100 ms
14:07:16.390800: wlp1s0: Setting scan request: 0 sec 100000 usec
14:07:16.390820: wlp1s0: State: AUTHENTICATING -> DISCONNECTED
14:07:16.390836: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
14:07:16.390853: netlink: Operstate: linkmode=-1, operstate=5
14:07:16.391010: EAPOL: External notification - portEnabled=0
14:07:16.391084: EAPOL: Supplicant port status: Unauthorized
14:07:16.391235: EAPOL: External notification - portValid=0
14:07:16.391259: EAPOL: Supplicant port status: Unauthorized
14:07:16.391324: EAPOL: External notification - EAP success=0
14:07:16.391345: EAPOL: Supplicant port status: Unauthorized
14:07:16.396129: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/7

14:07:16.490997: wlp1s0: State: DISCONNECTED -> SCANNING
14:07:16.491298: Scan SSID - hexdump_ascii(len=10):
     55 6e 69 46 69 2d 68 6f 6d 65                     UniFi-home      
14:07:16.491376: wlp1s0: Starting AP scan for wildcard SSID
14:07:16.491402: WPS: Building WPS IE for Probe Request
14:07:16.491423: WPS:  * Version (hardcoded 0x10)
14:07:16.491443: WPS:  * Request Type
14:07:16.491460: WPS:  * Config Methods (108)
14:07:16.491479: WPS:  * UUID-E
14:07:16.491497: WPS:  * Primary Device Type
14:07:16.491516: WPS:  * RF Bands (3)
14:07:16.491539: WPS:  * Association State
14:07:16.491556: WPS:  * Configuration Error (0)
14:07:16.491573: WPS:  * Device Password ID (0)
14:07:16.491590: WPS:  * Device Name
14:07:16.491614: P2P: * P2P IE header
14:07:16.491632: P2P: * Capability dev=25 group=00
14:07:16.491650: P2P: * Listen Channel: Regulatory Class 81 Channel 1
14:07:16.497711: Scan requested (ret=0) - scan timeout 30 seconds
14:07:16.497785: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/7
14:07:16.497961: nl80211: Event message available
14:07:16.497997: nl80211: Scan trigger



14:07:19.476335: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
14:07:19.476615: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp1s0' added
14:07:19.476778: nl80211: if_removed already cleared - ignore event
14:07:19.476858: nl80211: Event message available
14:07:19.476924: nl80211: New scan results available
14:07:19.476964: wlp1s0: Event SCAN_RESULTS (3) received
14:07:19.477246: nl80211: Received scan results (3 BSSes)
14:07:19.477430: wlp1s0: BSS: Start scan result update 3
14:07:19.477481: BSS: last_scan_res_used=3/32 last_scan_full=0
14:07:19.477507: wlp1s0: New scan results available
14:07:19.477590: wlp1s0: Selecting BSS from priority group 0
14:07:19.477621: wlp1s0: 0: 60:a4:4c:8d:99:24 ssid='1gnoraNT' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-21
14:07:19.477666: wlp1s0:    skip - SSID mismatch
14:07:19.477689: wlp1s0: 1: 60:a4:4c:8d:99:20 ssid='1gnoraNT' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=35
14:07:19.477707: wlp1s0:    skip - SSID mismatch
14:07:19.477727: wlp1s0: 2: 20:9f:db:e7:80:80 ssid='UniFi-home' wpa_ie_len=0 rsn_ie_len=20 caps=0x431 level=-57
14:07:19.477745: wlp1s0:    skip - blacklisted (count=1 limit=0)
14:07:19.477761: wlp1s0: No APs found - clear blacklist and try again
14:07:19.477776: Removed BSSID 20:9f:db:e7:80:80 from blacklist (clear)
14:07:19.477795: wlp1s0: Selecting BSS from priority group 0
14:07:19.477815: wlp1s0: 0: 60:a4:4c:8d:99:24 ssid='1gnoraNT' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-21
14:07:19.477831: wlp1s0:    skip - SSID mismatch
14:07:19.477851: wlp1s0: 1: 60:a4:4c:8d:99:20 ssid='1gnoraNT' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=35
14:07:19.477875: wlp1s0:    skip - SSID mismatch
14:07:19.477907: wlp1s0: 2: 20:9f:db:e7:80:80 ssid='UniFi-home' wpa_ie_len=0 rsn_ie_len=20 caps=0x431 level=-57
14:07:19.477936: wlp1s0:    selected based on RSN IE
14:07:19.477971: wlp1s0:    selected BSS 20:9f:db:e7:80:80 ssid='UniFi-home'
14:07:19.478009: wlp1s0: Request association: reassociate: 0  selected: 20:9f:db:e7:80:80  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING
14:07:19.478064: wlp1s0: Automatic auth_alg selection: 0x1
14:07:19.478090: RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
14:07:19.478113: RSN: Search for BSSID 20:9f:db:e7:80:80
14:07:19.478138: RSN: No PMKSA cache entry found
14:07:19.478163: wlp1s0: RSN: using IEEE 802.11i/D9.0
14:07:19.478190: wlp1s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
14:07:19.478218: wlp1s0: WPA: clearing AP WPA IE
14:07:19.478244: WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
14:07:19.478293: wlp1s0: WPA: using GTK CCMP
14:07:19.478317: wlp1s0: WPA: using PTK CCMP
14:07:19.478334: wlp1s0: WPA: using KEY_MGMT WPA-PSK
14:07:19.478351: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
14:07:19.478381: wlp1s0: Cancelling scan request
14:07:19.478402: wlp1s0: SME: Trying to authenticate with 20:9f:db:e7:80:80 (SSID='UniFi-home' freq=2462 MHz)
14:07:19.478419: wlp1s0: No keys have been configured - skip key clearing
14:07:19.478437: wlp1s0: State: SCANNING -> AUTHENTICATING
14:07:19.478529: EAPOL: External notification - EAP success=0
14:07:19.478554: EAPOL: Supplicant port status: Unauthorized
14:07:19.478668: EAPOL: External notification - EAP fail=0
14:07:19.478691: EAPOL: Supplicant port status: Unauthorized
14:07:19.478757: EAPOL: External notification - portControl=Auto
14:07:19.478777: EAPOL: Supplicant port status: Unauthorized
14:07:19.478850: nl80211: Authenticate (ifindex=3)
14:07:19.478873:   * bssid=20:9f:db:e7:80:80
14:07:19.478890:   * freq=2462
14:07:19.478905:   * SSID - hexdump_ascii(len=10):
     55 6e 69 46 69 2d 68 6f 6d 65                     UniFi-home      
14:07:19.478936:   * IEs - hexdump(len=0): [NULL]
14:07:19.478952:   * Auth Type 0
14:07:19.491512: nl80211: Authentication request send successfully
14:07:19.491554: RSN: Ignored PMKID candidate without preauth flag
14:07:19.491585: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/7
14:07:19.491738: nl80211: Event message available
14:07:19.491771: nl80211: New station 20:9f:db:e7:80:80
14:07:19.491796: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/7/BSSs/0
14:07:19.491898: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/7/BSSs/1
14:07:19.491997: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/7/BSSs/2
14:07:19.493794: nl80211: Event message available
14:07:19.493878: nl80211: MLME event 37
14:07:19.493911: nl80211: Authenticate event
14:07:19.493930: wlp1s0: Event AUTH (11) received
14:07:19.493951: wlp1s0: SME: Authentication response: peer=20:9f:db:e7:80:80 auth_type=0 auth_transaction=2 status_code=0
14:07:19.493971: wlp1s0: Trying to associate with 20:9f:db:e7:80:80 (SSID='UniFi-home' freq=2462 MHz)
14:07:19.493987: wlp1s0: State: AUTHENTICATING -> ASSOCIATING
14:07:19.494001: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
14:07:19.494016: netlink: Operstate: linkmode=-1, operstate=5
14:07:19.494181: WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
14:07:19.494223: nl80211: Associate (ifindex=3)
14:07:19.494245:   * bssid=20:9f:db:e7:80:80
14:07:19.494264:   * freq=2462
14:07:19.494279:   * SSID - hexdump_ascii(len=10):
     55 6e 69 46 69 2d 68 6f 6d 65                     UniFi-home      
14:07:19.494315:   * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
14:07:19.494335:   * pairwise=0xfac04
14:07:19.494347:   * group=0xfac04
14:07:19.494401: nl80211: Association request send successfully
14:07:19.499290: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/7
14:07:19.502837: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
14:07:19.502888: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp1s0' added
14:07:19.502958: nl80211: if_removed already cleared - ignore event
14:07:19.502985: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
14:07:19.503004: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp1s0' added
14:07:19.503066: nl80211: if_removed already cleared - ignore event
14:07:19.503092: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
14:07:19.503111: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp1s0' added
14:07:19.503152: nl80211: if_removed already cleared - ignore event
14:07:19.503176: nl80211: Event message available
14:07:19.503216: nl80211: MLME event 38
14:07:19.503237: nl80211: Associate event
14:07:19.503259: wlp1s0: Event ASSOC (0) received
14:07:19.503279: wlp1s0: Association info event
14:07:19.503298: resp_ies - hexdump(len=146): 01 08 02 04 0b 0c 12 16 18 24 32 04 30 48 60 6c 2d 1a ac 01 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 33 1a ac 01 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0b 08 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 34 16 0b 08 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
14:07:19.503397: wlp1s0: freq=2462 MHz
14:07:19.503411: wlp1s0: State: ASSOCIATING -> ASSOCIATED
14:07:19.503424: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
14:07:19.503435: netlink: Operstate: linkmode=-1, operstate=5
14:07:19.503536: wlp1s0: Associated to a new BSS: BSSID=20:9f:db:e7:80:80
14:07:19.503560: wlp1s0: No keys have been configured - skip key clearing
14:07:19.503575: wlp1s0: Associated with 20:9f:db:e7:80:80
14:07:19.503587: wlp1s0: WPA: Association event - clear replay counter
14:07:19.503599: wlp1s0: WPA: Clear old PTK
14:07:19.503610: EAPOL: External notification - portEnabled=0
14:07:19.503621: EAPOL: Supplicant port status: Unauthorized
14:07:19.503689: EAPOL: External notification - portValid=0
14:07:19.503705: EAPOL: Supplicant port status: Unauthorized
14:07:19.503749: EAPOL: External notification - EAP success=0
14:07:19.503763: EAPOL: Supplicant port status: Unauthorized
14:07:19.503804: EAPOL: External notification - portEnabled=1
14:07:19.503818: EAPOL: SUPP_PAE entering state CONNECTING
14:07:19.503828: EAPOL: enable timer tick
14:07:19.503838: EAPOL: SUPP_BE entering state IDLE
14:07:19.503852: wlp1s0: Setting authentication timeout: 10 sec 0 usec
14:07:19.503864: wlp1s0: Cancelling scan request
14:07:19.503885: nl80211: Event message available
14:07:19.503919: nl80211: Ignore connect event (cmd=46) when using userspace SME
14:07:19.504378: wlp1s0: RX EAPOL from 20:9f:db:e7:80:80
14:07:19.504416: wlp1s0: Setting authentication timeout: 10 sec 0 usec
14:07:19.504433: wlp1s0: IEEE 802.1X RX: version=2 type=3 length=95
14:07:19.504446: wlp1s0:   EAPOL-Key type=2
14:07:19.504461: wlp1s0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
14:07:19.504474: wlp1s0:   key_length=16 key_data_length=0
14:07:19.504485:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
14:07:19.504499:   key_nonce - hexdump(len=32): 5d c0 82 5f 17 49 48 3c 76 75 c5 3e e2 d2 85 fe df d2 f4 6c 79 36 a6 3b 0c 72 5f 28 f3 c8 2e 32
14:07:19.504519:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
14:07:19.504534:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
14:07:19.504547:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
14:07:19.504560:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
14:07:19.504581: wlp1s0: State: ASSOCIATED -> 4WAY_HANDSHAKE
14:07:19.504682: wlp1s0: WPA: RX message 1 of 4-Way Handshake from 20:9f:db:e7:80:80 (ver=2)
14:07:19.504705: RSN: msg 1/4 key data - hexdump(len=0):
14:07:19.505692: WPA: Renewed SNonce - hexdump(len=32): 8d 66 b1 e5 b0 ac ca f0 11 b2 8e c3 17 cc 21 4f e3 2c 05 e9 71 54 29 33 e9 b9 0d d9 89 66 be ad
14:07:19.505738: WPA: PTK derivation - A1=9c:2a:70:55:68:a3 A2=20:9f:db:e7:80:80
14:07:19.505753: WPA: Nonce1 - hexdump(len=32): 8d 66 b1 e5 b0 ac ca f0 11 b2 8e c3 17 cc 21 4f e3 2c 05 e9 71 54 29 33 e9 b9 0d d9 89 66 be ad
14:07:19.505772: WPA: Nonce2 - hexdump(len=32): 5d c0 82 5f 17 49 48 3c 76 75 c5 3e e2 d2 85 fe df d2 f4 6c 79 36 a6 3b 0c 72 5f 28 f3 c8 2e 32
14:07:19.505792: WPA: PMK - hexdump(len=32): [REMOVED]
14:07:19.505803: WPA: PTK - hexdump(len=48): [REMOVED]
14:07:19.505814: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
14:07:19.505833: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
14:07:19.505850: wlp1s0: WPA: Sending EAPOL-Key 2/4
14:07:19.505868: WPA: KCK - hexdump(len=16): [REMOVED]
14:07:19.505880: WPA: Derived Key MIC - hexdump(len=16): 8d 43 7a 12 ee 85 ec d0 26 88 e8 e1 b3 a2 cb 94
14:07:19.508658: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/7
14:07:19.509707: wlp1s0: RX EAPOL from 20:9f:db:e7:80:80
14:07:19.509770: wlp1s0: IEEE 802.1X RX: version=2 type=3 length=151
14:07:19.509788: wlp1s0:   EAPOL-Key type=2
14:07:19.509808: wlp1s0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
14:07:19.509825: wlp1s0:   key_length=16 key_data_length=56
14:07:19.509840:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
14:07:19.509859:   key_nonce - hexdump(len=32): 5d c0 82 5f 17 49 48 3c 76 75 c5 3e e2 d2 85 fe df d2 f4 6c 79 36 a6 3b 0c 72 5f 28 f3 c8 2e 32
14:07:19.509886:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
14:07:19.509906:   key_rsc - hexdump(len=8): 1e c3 02 00 00 00 00 00
14:07:19.509924:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
14:07:19.509942:   key_mic - hexdump(len=16): 14 e0 b0 ca 99 c1 d1 6f d2 b2 d5 24 2a 42 53 b4
14:07:19.509989: RSN: encrypted key data - hexdump(len=56): 29 71 36 bb 24 08 d7 39 bc 97 d7 b1 bd 3e f8 37 3b f1 58 c9 b0 8d 98 88 61 71 fa 0c 7d 72 5b fd 21 fe d4 09 ab fe 63 23 b1 1c 1e a1 13 cb bc c0 f7 94 e9 b9 ab 43 2d 22
14:07:19.510064: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
14:07:19.510088: wlp1s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
14:07:19.510108: wlp1s0: WPA: RX message 3 of 4-Way Handshake from 20:9f:db:e7:80:80 (ver=2)
14:07:19.510122: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 87 61 3e a2 ef 3b 39 c8 c3 1f 50 63 b0 39 b8 b5 dd 00
14:07:19.510162: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
14:07:19.510209: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
14:07:19.510233: wlp1s0: WPA: Sending EAPOL-Key 4/4
14:07:19.510259: WPA: KCK - hexdump(len=16): [REMOVED]
14:07:19.510275: WPA: Derived Key MIC - hexdump(len=16): 6c 0c be 9c ea c7 b0 2c 7c 53 cc fd f1 27 fc 7b
14:07:19.510338: wlp1s0: WPA: Installing PTK to the driver
14:07:19.510405: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7f0ab41cad68 key_idx=0 set_tx=1 seq_len=6 key_len=16
14:07:19.510435:    addr=20:9f:db:e7:80:80
14:07:19.510844: EAPOL: External notification - portValid=1
14:07:19.510872: wlp1s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
14:07:19.510965: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
14:07:19.510989: WPA: Group Key - hexdump(len=16): [REMOVED]
14:07:19.511009: wlp1s0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
14:07:19.511038: WPA: RSC - hexdump(len=6): 1e c3 02 00 00 00
14:07:19.511086: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7f0ab33c53c6 key_idx=1 set_tx=0 seq_len=6 key_len=16
14:07:19.511120:    broadcast key
14:07:19.511205: wlp1s0: WPA: Key negotiation completed with 20:9f:db:e7:80:80 [PTK=CCMP GTK=CCMP]
14:07:19.511223: wlp1s0: Cancelling authentication timeout
14:07:19.511238: wlp1s0: State: GROUP_HANDSHAKE -> COMPLETED
14:07:19.511253: wlp1s0: CTRL-EVENT-CONNECTED - Connection to 20:9f:db:e7:80:80 completed [id=0 id_str=]
14:07:19.511264: wpa_driver_nl80211_set_operstate: operstate 0->1 (UP)
14:07:19.511276: netlink: Operstate: linkmode=-1, operstate=6
14:07:19.511418: EAPOL: External notification - portValid=1
14:07:19.511443: EAPOL: External notification - EAP success=1
14:07:19.511459: EAPOL: SUPP_PAE entering state AUTHENTICATING
14:07:19.511475: EAPOL: SUPP_BE entering state SUCCESS
14:07:19.511487: EAP: EAP entering state DISABLED
14:07:19.511508: EAPOL: SUPP_PAE entering state AUTHENTICATED
14:07:19.511518: EAPOL: Supplicant port status: Authorized
14:07:19.511583: EAPOL: SUPP_BE entering state IDLE
14:07:19.511598: EAPOL authentication completed successfully
14:07:19.511640: RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
14:07:19.511656: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp1s0' added
14:07:19.511696: nl80211: if_removed already cleared - ignore event
14:07:19.516100: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/7


14:07:20.504233: EAPOL: startWhen --> 0
14:07:20.504335: EAPOL: disable timer tick
14:07:20.511791: wlp1s0: RX EAPOL from 20:9f:db:e7:80:80
14:07:20.511880: wlp1s0: IEEE 802.1X RX: version=2 type=3 length=151
14:07:20.511905: wlp1s0:   EAPOL-Key type=2
14:07:20.511932: wlp1s0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
14:07:20.511957: wlp1s0:   key_length=16 key_data_length=56
14:07:20.511977:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
14:07:20.512005:   key_nonce - hexdump(len=32): 5d c0 82 5f 17 49 48 3c 76 75 c5 3e e2 d2 85 fe df d2 f4 6c 79 36 a6 3b 0c 72 5f 28 f3 c8 2e 32
14:07:20.512068:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
14:07:20.512095:   key_rsc - hexdump(len=8): 20 c3 02 00 00 00 00 00
14:07:20.512118:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
14:07:20.512142:   key_mic - hexdump(len=16): 16 ba 4f 33 60 ab a5 c3 cc 70 05 39 e2 39 b0 c6
14:07:20.512204: RSN: encrypted key data - hexdump(len=56): 29 71 36 bb 24 08 d7 39 bc 97 d7 b1 bd 3e f8 37 3b f1 58 c9 b0 8d 98 88 61 71 fa 0c 7d 72 5b fd 21 fe d4 09 ab fe 63 23 b1 1c 1e a1 13 cb bc c0 f7 94 e9 b9 ab 43 2d 22
14:07:20.512268: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
14:07:20.512299: wlp1s0: State: COMPLETED -> 4WAY_HANDSHAKE
14:07:20.512476: wlp1s0: WPA: RX message 3 of 4-Way Handshake from 20:9f:db:e7:80:80 (ver=2)
14:07:20.512516: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 87 61 3e a2 ef 3b 39 c8 c3 1f 50 63 b0 39 b8 b5 dd 00
14:07:20.512602: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
14:07:20.512641: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
14:07:20.512674: wlp1s0: WPA: Sending EAPOL-Key 4/4
14:07:20.512716: WPA: KCK - hexdump(len=16): [REMOVED]
14:07:20.512740: WPA: Derived Key MIC - hexdump(len=16): 4d 4d 71 45 dd c0 59 db 07 22 06 f2 de 4f 2d fd
14:07:20.512839: wlp1s0: WPA: Installing PTK to the driver
14:07:20.513170: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7f0ab41cad68 key_idx=0 set_tx=1 seq_len=6 key_len=16
14:07:20.513231:    addr=20:9f:db:e7:80:80
14:07:20.513830: EAPOL: External notification - portValid=1
14:07:20.513885: wlp1s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
14:07:20.514659: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
14:07:20.514693: WPA: Group Key - hexdump(len=16): [REMOVED]
14:07:20.514713: wlp1s0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
14:07:20.514727: WPA: RSC - hexdump(len=6): 20 c3 02 00 00 00
14:07:20.514784: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7f0ab33c53c6 key_idx=1 set_tx=0 seq_len=6 key_len=16
14:07:20.514809:    broadcast key
14:07:20.514953: wlp1s0: WPA: Key negotiation completed with 20:9f:db:e7:80:80 [PTK=CCMP GTK=CCMP]
14:07:20.514975: wlp1s0: Cancelling authentication timeout
14:07:20.514993: wlp1s0: State: GROUP_HANDSHAKE -> COMPLETED
14:07:20.515086: EAPOL: External notification - portValid=1
14:07:20.515111: EAPOL: External notification - EAP success=1
14:07:20.515126: EAP: EAP entering state DISABLED
14:07:20.517598: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/7


14:07:21.512532: wlp1s0: RX EAPOL from 20:9f:db:e7:80:80
14:07:21.512656: wlp1s0: IEEE 802.1X RX: version=2 type=3 length=151
14:07:21.512705: wlp1s0:   EAPOL-Key type=2
14:07:21.512762: wlp1s0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
14:07:21.512794: wlp1s0:   key_length=16 key_data_length=56
14:07:21.512815:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
14:07:21.512842:   key_nonce - hexdump(len=32): 5d c0 82 5f 17 49 48 3c 76 75 c5 3e e2 d2 85 fe df d2 f4 6c 79 36 a6 3b 0c 72 5f 28 f3 c8 2e 32
14:07:21.512877:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
14:07:21.512905:   key_rsc - hexdump(len=8): 21 c3 02 00 00 00 00 00
14:07:21.512929:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
14:07:21.512954:   key_mic - hexdump(len=16): 72 52 fb d9 df 40 70 38 00 90 fd 04 94 ce 49 47
14:07:21.513011: RSN: encrypted key data - hexdump(len=56): 29 71 36 bb 24 08 d7 39 bc 97 d7 b1 bd 3e f8 37 3b f1 58 c9 b0 8d 98 88 61 71 fa 0c 7d 72 5b fd 21 fe d4 09 ab fe 63 23 b1 1c 1e a1 13 cb bc c0 f7 94 e9 b9 ab 43 2d 22
14:07:21.513116: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
14:07:21.513151: wlp1s0: State: COMPLETED -> 4WAY_HANDSHAKE
14:07:21.513331: wlp1s0: WPA: RX message 3 of 4-Way Handshake from 20:9f:db:e7:80:80 (ver=2)
14:07:21.513366: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 87 61 3e a2 ef 3b 39 c8 c3 1f 50 63 b0 39 b8 b5 dd 00
14:07:21.513386: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
14:07:21.513398: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
14:07:21.513413: wlp1s0: WPA: Sending EAPOL-Key 4/4
14:07:21.513430: WPA: KCK - hexdump(len=16): [REMOVED]
14:07:21.513443: WPA: Derived Key MIC - hexdump(len=16): 54 de c5 24 de 6e f8 08 7f bd 93 8d 85 9f bc 6f
14:07:21.513537: wlp1s0: WPA: Installing PTK to the driver
14:07:21.513652: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7f0ab41cad68 key_idx=0 set_tx=1 seq_len=6 key_len=16
14:07:21.513702:    addr=20:9f:db:e7:80:80
14:07:21.514084: EAPOL: External notification - portValid=1
14:07:21.514128: wlp1s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
14:07:21.514246: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
14:07:21.514273: WPA: Group Key - hexdump(len=16): [REMOVED]
14:07:21.514295: wlp1s0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
14:07:21.514300: WPA: RSC - hexdump(len=6): 21 c3 02 00 00 00
14:07:21.514325: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7f0ab33c53c6 key_idx=1 set_tx=0 seq_len=6 key_len=16
14:07:21.514333:    broadcast key
14:07:21.514460: wlp1s0: WPA: Key negotiation completed with 20:9f:db:e7:80:80 [PTK=CCMP GTK=CCMP]
14:07:21.514486: wlp1s0: Cancelling authentication timeout
14:07:21.514506: wlp1s0: State: GROUP_HANDSHAKE -> COMPLETED
14:07:21.514594: EAPOL: External notification - portValid=1
14:07:21.514618: EAPOL: External notification - EAP success=1
14:07:21.514643: EAP: EAP entering state DISABLED
14:07:21.518424: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/7


14:07:22.513566: wlp1s0: RX EAPOL from 20:9f:db:e7:80:80
14:07:22.513676: wlp1s0: IEEE 802.1X RX: version=2 type=3 length=151
14:07:22.513711: wlp1s0:   EAPOL-Key type=2
14:07:22.513745: wlp1s0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
14:07:22.513774: wlp1s0:   key_length=16 key_data_length=56
14:07:22.513802:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
14:07:22.513829:   key_nonce - hexdump(len=32): 5d c0 82 5f 17 49 48 3c 76 75 c5 3e e2 d2 85 fe df d2 f4 6c 79 36 a6 3b 0c 72 5f 28 f3 c8 2e 32
14:07:22.513861:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
14:07:22.513887:   key_rsc - hexdump(len=8): 24 c3 02 00 00 00 00 00
14:07:22.513909:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
14:07:22.513933:   key_mic - hexdump(len=16): 3a 19 8e 94 11 1a aa 0a 04 9a 7c 96 09 6a 0f 65
14:07:22.513988: RSN: encrypted key data - hexdump(len=56): 29 71 36 bb 24 08 d7 39 bc 97 d7 b1 bd 3e f8 37 3b f1 58 c9 b0 8d 98 88 61 71 fa 0c 7d 72 5b fd 21 fe d4 09 ab fe 63 23 b1 1c 1e a1 13 cb bc c0 f7 94 e9 b9 ab 43 2d 22
14:07:22.514107: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
14:07:22.514141: wlp1s0: State: COMPLETED -> 4WAY_HANDSHAKE
14:07:22.514320: wlp1s0: WPA: RX message 3 of 4-Way Handshake from 20:9f:db:e7:80:80 (ver=2)
14:07:22.514365: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 87 61 3e a2 ef 3b 39 c8 c3 1f 50 63 b0 39 b8 b5 dd 00
14:07:22.514416: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
14:07:22.514452: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
14:07:22.514485: wlp1s0: WPA: Sending EAPOL-Key 4/4
14:07:22.514536: WPA: KCK - hexdump(len=16): [REMOVED]
14:07:22.514565: WPA: Derived Key MIC - hexdump(len=16): 2a 2a 79 af 1b 19 94 89 a4 fd 84 c0 a7 a4 9b 3a
14:07:22.514664: wlp1s0: WPA: Installing PTK to the driver
14:07:22.514776: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7f0ab41cad68 key_idx=0 set_tx=1 seq_len=6 key_len=16
14:07:22.514828:    addr=20:9f:db:e7:80:80
14:07:22.515228: EAPOL: External notification - portValid=1
14:07:22.515281: wlp1s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
14:07:22.515397: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
14:07:22.515423: WPA: Group Key - hexdump(len=16): [REMOVED]
14:07:22.515444: wlp1s0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
14:07:22.515460: WPA: RSC - hexdump(len=6): 24 c3 02 00 00 00
14:07:22.515528: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7f0ab33c53c6 key_idx=1 set_tx=0 seq_len=6 key_len=16
14:07:22.515555:    broadcast key
14:07:22.515722: wlp1s0: WPA: Key negotiation completed with 20:9f:db:e7:80:80 [PTK=CCMP GTK=CCMP]
14:07:22.515748: wlp1s0: Cancelling authentication timeout
14:07:22.515792: wlp1s0: State: GROUP_HANDSHAKE -> COMPLETED
14:07:22.515880: EAPOL: External notification - portValid=1
14:07:22.515904: EAPOL: External notification - EAP success=1
14:07:22.515920: EAP: EAP entering state DISABLED
14:07:22.519416: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/7
14:07:23.513500: RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP])
14:07:23.513662: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp1s0' added
14:07:23.513842: nl80211: if_removed already cleared - ignore event
14:07:23.536309: nl80211: Event message available
14:07:23.536454: nl80211: Delete station 20:9f:db:e7:80:80
14:07:23.542786: nl80211: Event message available
14:07:23.542882: nl80211: MLME event 39
14:07:23.542903: nl80211: Deauthenticate event
14:07:23.542927: wlp1s0: Event DEAUTH (12) received
14:07:23.542946: wlp1s0: Deauthentication notification
14:07:23.542964: wlp1s0:  * reason 2
14:07:23.542982: wlp1s0:  * address 20:9f:db:e7:80:80
14:07:23.542997: Deauthentication frame IE(s) - hexdump(len=0): [NULL]
14:07:23.543055: wlp1s0: CTRL-EVENT-DISCONNECTED bssid=20:9f:db:e7:80:80 reason=2
14:07:23.543096: wlp1s0: Auto connect enabled: try to reconnect (wps=0 wpa_state=9)
14:07:23.543115: wlp1s0: Setting scan request: 0 sec 100000 usec
14:07:23.543133: Added BSSID 20:9f:db:e7:80:80 into blacklist
14:07:23.543155: wlp1s0: Blacklist count 1 --> request scan in 100 ms
14:07:23.543172: wlp1s0: Not rescheduling scan to ensure that specific SSID scans occur
14:07:23.543388: wlp1s0: Disconnect event - remove keys
14:07:23.543485: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
14:07:23.551379: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
14:07:23.551706: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
14:07:23.551884: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
14:07:23.551995: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x7f0ab41a7e08 key_idx=0 set_tx=0 seq_len=0 key_len=0
14:07:23.552087:    addr=20:9f:db:e7:80:80
14:07:23.552218: wlp1s0: State: COMPLETED -> DISCONNECTED
14:07:23.552284: wpa_driver_nl80211_set_operstate: operstate 1->0 (DORMANT)
14:07:23.552310: netlink: Operstate: linkmode=-1, operstate=5
14:07:23.552487: EAPOL: External notification - portEnabled=0
14:07:23.552519: EAPOL: SUPP_PAE entering state DISCONNECTED
14:07:23.552537: EAPOL: Supplicant port status: Unauthorized
14:07:23.552659: EAPOL: SUPP_BE entering state INITIALIZE
14:07:23.552685: EAPOL: Supplicant port status: Unauthorized
14:07:23.552741: EAPOL: External notification - portValid=0
14:07:23.552758: EAPOL: Supplicant port status: Unauthorized
14:07:23.552806: EAPOL: External notification - EAP success=0
14:07:23.552823: EAPOL: Supplicant port status: Unauthorized
14:07:23.552893: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
14:07:23.552914: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp1s0' added
14:07:23.552946: nl80211: if_removed already cleared - ignore event
14:07:23.552962: nl80211: Event message available
14:07:23.552984: nl80211: Ignore disconnect event when using userspace SME
14:07:23.557565: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/7
14:07:23.565840: nl80211: Event message available
14:07:23.565923: nl80211: Regulatory domain change
14:07:23.565950: wlp1s0: Event CHANNEL_LIST_CHANGED (31) received
14:07:23.566181: nl80211: Regulatory information - country=00
14:07:23.566210: nl80211: 2402-2472 @ 40 MHz
14:07:23.566230: nl80211: 2457-2482 @ 40 MHz
14:07:23.566248: nl80211: 2474-2494 @ 20 MHz
14:07:23.566267: nl80211: 5170-5250 @ 80 MHz
14:07:23.566284: nl80211: 5250-5330 @ 80 MHz
14:07:23.566301: nl80211: 5490-5730 @ 160 MHz
14:07:23.566317: nl80211: 5735-5835 @ 80 MHz
14:07:23.566354: nl80211: 57240-63720 @ 2160 MHz
14:07:23.566398: nl80211: Added 802.11b mode based on 802.11g information
14:07:23.566420: P2P: Add operating class 81
14:07:23.566437: P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
14:07:23.566467: wlp1s0: P2P: Update channel list
14:07:23.570997: nl80211: Event message available
14:07:23.571078: nl80211: Regulatory domain change
14:07:23.571100: wlp1s0: Event CHANNEL_LIST_CHANGED (31) received
14:07:23.571306: nl80211: Regulatory information - country=US
14:07:23.571330: nl80211: 2402-2472 @ 40 MHz
14:07:23.571347: nl80211: 5170-5250 @ 80 MHz
14:07:23.571364: nl80211: 5250-5330 @ 80 MHz
14:07:23.571380: nl80211: 5490-5600 @ 80 MHz
14:07:23.571396: nl80211: 5650-5710 @ 40 MHz
14:07:23.571411: nl80211: 5735-5835 @ 80 MHz
14:07:23.571426: nl80211: 57240-63720 @ 2160 MHz
14:07:23.571462: nl80211: Added 802.11b mode based on 802.11g information
14:07:23.571481: P2P: Add operating class 81
14:07:23.571498: P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
14:07:23.571525: wlp1s0: P2P: Update channel list
14:07:23.643319: wlp1s0: State: DISCONNECTED -> SCANNING
14:07:23.643497: Scan SSID - hexdump_ascii(len=10):
     55 6e 69 46 69 2d 68 6f 6d 65                     UniFi-home      
14:07:23.643575: wlp1s0: Starting AP scan for wildcard SSID
14:07:23.643607: WPS: Building WPS IE for Probe Request
14:07:23.643636: WPS:  * Version (hardcoded 0x10)
14:07:23.643664: WPS:  * Request Type
14:07:23.643683: WPS:  * Config Methods (108)
14:07:23.643696: WPS:  * UUID-E
14:07:23.643709: WPS:  * Primary Device Type
14:07:23.643722: WPS:  * RF Bands (3)
14:07:23.643736: WPS:  * Association State
14:07:23.643749: WPS:  * Configuration Error (0)
14:07:23.643763: WPS:  * Device Password ID (0)
14:07:23.643777: WPS:  * Device Name
14:07:23.643797: P2P: * P2P IE header
14:07:23.643810: P2P: * Capability dev=25 group=00
14:07:23.643825: P2P: * Listen Channel: Regulatory Class 81 Channel 1
14:07:23.648488: Scan requested (ret=0) - scan timeout 30 seconds
14:07:23.648536: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/7
14:07:23.648664: nl80211: Event message available
14:07:23.648704: nl80211: Scan trigger


[Index of Archives]     [Linux Host AP]     [ATH6KL]     [Linux Wireless Personal Area Network]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Linux Kernel]     [IDE]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite Hiking]     [MIPS Linux]     [ARM Linux]     [Linux RAID]

  Powered by Linux