Still trying to pinpoint what is happening when it works versus when it does not. Using iwd 3.3 (built from git at gbf82aff0) with connman (1.41-1.43) will negotiate a successful WPA3/SAE AP connection some times. When it fails, it generally (maybe always?) gets an APIPA address and does not negotiate getting a DHCP address. When I compare the logs side by side, I see that when it sets the APIPA address it shows: Jan 22 19:44:36 Pi4 iwd[2259036]: event: connect-info, FullMAC driver: brcmfmac using SAE. Expect EXTERNAL_AUTH Jan 22 19:44:36 Pi4 iwd[2259036]: src/pmksa.c:pmksa_cache_get() Returning entry with PMKID: dc1225e288927453b9879a01d47d7af5 Jan 22 19:44:36 Pi4 iwd[2259036]: src/netdev.c:netdev_connect_common() Skipping SAE by using PMKSA cache Jan 22 19:44:36 Pi4 iwd[2259036]: src/netdev.c:netdev_cqm_rssi_update() Jan 22 19:44:36 Pi4 iwd[2259036]: src/wiphy.c:wiphy_radio_work_insert() Inserting work item 15 Jan 22 19:44:36 Pi4 iwd[2259036]: src/wiphy.c:wiphy_radio_work_next() Starting work item 15 Jan 22 19:44:36 Pi4 iwd[2259036]: event: connect-info, ssid: deskSAE, bss: d8:3a:dd:60:a3:0c, signal: -59, load: 0/255 Jan 22 19:44:36 Pi4 iwd[2259036]: event: state, old: disconnected, new: connecting then later, it has this: Jan 22 19:44:36 Pi4 kernel: ieee80211 phy0: brcmf_cfg80211_external_auth: External authentication failed: status=1 this line is always there when it does not negotiate DHCP. whereas when it sets up correctly with a DHCP address, it does this: Jan 22 19:57:56 Pi4 iwd[2259036]: event: connect-info, FullMAC driver: brcmfmac using SAE. Expect EXTERNAL_AUTH Jan 22 19:57:56 Pi4 iwd[2259036]: src/netdev.c:netdev_cqm_rssi_update() Jan 22 19:57:56 Pi4 iwd[2259036]: src/wiphy.c:wiphy_radio_work_insert() Inserting work item 17 Jan 22 19:57:56 Pi4 iwd[2259036]: src/wiphy.c:wiphy_radio_work_next() Starting work item 17 Jan 22 19:57:56 Pi4 iwd[2259036]: event: connect-info, ssid: deskSAE, bss: d8:3a:dd:60:a3:0c, signal: -59, load: 0/255 Jan 22 19:57:56 Pi4 iwd[2259036]: event: state, old: disconnected, new: connecting what I am doing to repeatedly test this is to remove the config for the WPA3 AP via connmanctl and re-initiate the connection The attached logs are of iwmon and the journal showing a successful DHCP connection and an unsuccessful APIPA connection. Is this still a problem with the driver/firmware, or of iwd? When I use wpa_supplicant 2.10-12+deb12u2 with connman, it connects properly every time. If needed, I also have logs of a successful wpa_supplicant connection. It looks a lot like the successful iwd connection. The only difference in the iwmon logs between a successful iwd connection and a wpa_supplicant connection (to my untrained eyes) is that it has different IFLA flags iwd: > RTNL: New Link (0x10) len 128 9.038969 Flags: 0 (0x000) Sequence number: 0 (0x00000000) Port ID: 0 IFLA Family: Unknown IFLA Type: 1 IFLA Index: 3 IFLA ChangeMask: 0 IFLA Flags: (0x1043) [up,broadcast,running,multicast] wpa_supplicant > RTNL: New Link (0x10) len 136 48.126129 Flags: 0 (0x000) Sequence number: 0 (0x00000000) Port ID: 0 IFLA Family: Unknown IFLA Type: 1 IFLA Index: 3 IFLA ChangeMask: 0 IFLA Flags: (0x9003) [up,broadcast,multicast,dynamic] These logs have been trimmed and I hope I have the relevant bits. Keith On Thu, Jan 9, 2025 at 8:19 PM KeithG <ys3al35l@xxxxxxxxx> wrote: > > On Mon, Jan 6, 2025 at 11:13 AM KeithG <ys3al35l@xxxxxxxxx> wrote: > > > > On Mon, Jan 6, 2025 at 9:26 AM Denis Kenzior <denkenz@xxxxxxxxx> wrote: > > > > > > Hi Keith, > > > > > > On 1/5/25 6:41 PM, KeithG wrote: > > > > I am looking at the iwmon logs for a successful wpa_supplicant > > > > connection versus one from IWD. Both connect and both pass data and > > > > both grab a DHCP address. I do note one difference in the connection, > > > > though. > > > > > > > > Request : Connect > > > > through the responses RTNL > > > > wpa_supplicant knows it is dynamic > > > > > > wpa_supplicant doesn't manage network interfaces. I assume you're using ConnMan > > > for this? If so, ConnMan sets the IFF_DYNAMIC flag. See > > > https://git.kernel.org/pub/scm/network/connman/connman.git/tree/src/inet.c#n372 > > > > > > > > > > > Whereas the iwd log does not: > > > > > > iwd doesn't use IFF_DYNAMIC in its DHCP implementation at the moment. > > > > > > According to 'man netdevice': > > > > > > IFF_DYNAMIC The addresses are lost when the interface > > > goes down. > > > > > > I doubt this is the cause of your DHCP / connection problems. > > > > > > Regards, > > > -Denis > > > > Denis, > > > > I am using connman to manage the connections. The connman config is > > the same. The one iwmon snippet was with iwd masked and stopped but > > wpa_supplicant installed and the connect performed in connmanctl. The > > other is with wpa_supplicant removed and purged and iwd started, > > running then restarted connman then initiated a connect form > > connmanctl. > > > > I pored over these logs yesterday and saw a few differences, but this > > was one that stood out. I can look closer again tonight and see if I > > notice anything else that I can summarize. > > > > Keith > > Still looking at these iwmon logs. The attached log is the log of > using wpa_supplicant under connman to make a valid connection but w/o > all the AP scanning... > > using wpa_supplicant with connman works every time. It is with iwd > that I get varying behavior. Looking through the iwmon logs to see > what is sent and what is received, it looks like there are some > differences. I am guessing that the first '< Request: Connect' is what > is sent to the AP to request a connection. > wpa_supplicant sends more info: > Under < Request: Connect' > 'RSN capabilities: bit 6: Management Frame Protection Required > ... > BIP (00:0f:ac) suite 06 > 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................ > ac 08 c0 00 00 00 00 0f ac 06 > ... > Extended Capabilities: len 11 > Capability: bit 17: WNM-Sleep mode > ... > Capability: bit 25: SSID list > Capability: bit 46: WNM- Notification > Capability: bit 54: SCS > ... > Then the < Request: Frame (0x3b), iwd never increments its Sequence > number. It always stays at 0 whereas wpa_supplicant starts its > sequence at 1 > Also, wpa_supplincant has this flag set: > < Request: Frame (0x3b) len 80 [ack] 14.502956 > ... > Don't Wait for Ack: true > ... > Error decoding Supported rates IE len 0: Invalid > argument (-22) > Tag 92: len 7 > 56 16 6f 94 3f 4d d9 > V.o.?M. > > With wpa_supplincant, before the AP sends the 'PAE:', we get this > which is not in any of the iwmon logs with iwd: > < Request: Set PMKSA (0x34) len 92 [ack] 14.561627 > Interface Index: 3 (0x00000003) > PMKID: len 16 > 05 cb 9d 0d 9a c6 7c 42 77 b5 d2 23 f0 62 f7 4d ......|Bw..#.b.M > MAC Address D8:3A:DD:60:A3:0C > Unknown: 287 len 4 > c0 a8 00 00 .... > Unknown: 288 len 1 > 46 F > PMK: 254 len 32 > 35 28 07 cb 94 de 82 e7 0a 5c 73 d3 e4 1f 88 ae 5(.......\s..... > 74 84 82 66 86 8d b5 aa 79 cb 75 d9 75 8d da 3a t..f....y.u.u..: > > Response: Set PMKSA (0x34) len 4 [0x100] 14.562171 > Status: Success (0) > > Is there any more info or help I can provide?
< Request: Set CQM (0x3f) len 28 [ack] 8.950373 Interface Index: 3 (0x00000003) CQM: len 16 RSSI thresholds: Threshold: -70 RSSI hysteresis: 5 (0x00000005) > Response: Set CQM (0x3f) len 4 8.950405 Status: Operation not supported (95) < Request: Connect (0x2e) len 148 [ack] 8.950461 Interface Index: 3 (0x00000003) Wiphy Frequency: 2412 (0x0000096c) MAC Address D8:3A:DD:60:A3:0C SSID: len 7 64 65 73 6b 53 41 45 deskSAE Auth Type: 4 (0x00000004) External Auth Support: 261 len 0 Privacy: true Socket Owns Interface/Connection: true Cipher Suites Pairwise: CCMP (00:0f:ac) suite 04 Cipher Suite Group: CCMP (00:0f:ac) suite 04 Use MFP: 1 (0x00000001) AKM Suites: SAE/PMKSA caching SHA256; RSNA PMKSA caching SHA256/mesh peering exchange (00:0f:ac) suite 08 WPA Versions: 4 (0x00000004) Control Port: true Information Elements: len 38 RSN: Group Data Cipher Suite: len 4 CCMP (00:0f:ac) suite 04 Pairwise Cipher Suite: len 4 CCMP (00:0f:ac) suite 04 AKM Suite: len 4 SAE/PMKSA caching SHA256; RSNA PMKSA caching SHA256/mesh peering exchange (00:0f:ac) suite 08 RSN capabilities: bits 2 - 3: 1 replay counter per PTKSA RSN capabilities: bits 4 - 5: 1 replay counter per GTKSA RSN capabilities: bit 7: Management Frame Protection Capable 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................ ac 08 80 00 .... Extended Capabilities: len 10 Capability: bit 19: BSS transition 00 00 08 00 00 00 00 00 00 01 .......... Tag 262: len 1 1a . > Response: Connect (0x2e) len 4 [0x100] 8.957665 Status: Success (0) > Event: External Auth (0x7f) len 56 8.981705 Wiphy: 0 (0x00000000) Interface Index: 3 (0x00000003) AKM Suites: unknown (08:ac:0f) suite 00 (unknown) External Auth Action: 260 len 4 00 00 00 00 .... BSSID D8:3A:DD:60:A3:0C SSID: len 7 64 65 73 6b 53 41 45 deskSAE < Request: Frame (0x3b) len 140 [ack] 8.992485 Interface Index: 3 (0x00000003) Frame: len 128 Frame Type: 0x00b0 Type: Management (0) Authentication: Frame Control: protocol: 00 type: 00 subtype: 11 to: 00 from: 00 more_frags: 00 retry: 00 power_mgmt: 00 more_data: 00 protected: 00 order: 00 Duration: 0 Address 1 (RA): D8:3A:DD:60:A3:0C Address 2 (TA): DC:A6:32:B4:50:CF Address 3: D8:3A:DD:60:A3:0C Fragment Number: 0 Sequence Number: 0 Algorithm: SAE (seq: 1, status: 0) b0 00 00 00 d8 3a dd 60 a3 0c dc a6 32 b4 50 cf .....:.`....2.P. d8 3a dd 60 a3 0c 00 00 03 00 01 00 00 00 13 00 .:.`............ 90 6a b5 c5 a2 14 2c d0 5f 7d 46 a6 97 7c 2d 5d .j....,._}F..|-] 1e 17 2a 99 04 d0 c8 6b a0 9e 22 7e 0c 0d a4 02 ..*....k.."~.... 23 e7 88 5d 73 0f 11 b7 c6 c8 e0 fe 4c 58 ce fe #..]s.......LX.. 1e 25 ba 67 51 fe 3a 7e 88 24 4f 6f 6c a6 67 17 .%.gQ.:~.$Ool.g. 1a c7 1d 2d 0f de 57 e3 a2 09 6a d2 99 62 6f 61 ...-..W...j..boa 1f 99 71 f9 bf f5 bc 0b 4d 20 1a 94 e2 37 d0 25 ..q.....M ...7.% > Event: Frame TX Status (0x3c) len 176 8.994818 Wiphy: 0 (0x00000000) Interface Index: 3 (0x00000003) Wireless Device: 1 (0x0000000000000001) Frame: len 128 Frame Type: 0x00b0 Type: Management (0) Authentication: Frame Control: protocol: 00 type: 00 subtype: 11 to: 00 from: 00 more_frags: 00 retry: 00 power_mgmt: 00 more_data: 00 protected: 00 order: 00 Duration: 0 Address 1 (RA): D8:3A:DD:60:A3:0C Address 2 (TA): DC:A6:32:B4:50:CF Address 3: D8:3A:DD:60:A3:0C Fragment Number: 0 Sequence Number: 0 Algorithm: SAE (seq: 1, status: 0) b0 00 00 00 d8 3a dd 60 a3 0c dc a6 32 b4 50 cf .....:.`....2.P. d8 3a dd 60 a3 0c 00 00 03 00 01 00 00 00 13 00 .:.`............ 90 6a b5 c5 a2 14 2c d0 5f 7d 46 a6 97 7c 2d 5d .j....,._}F..|-] 1e 17 2a 99 04 d0 c8 6b a0 9e 22 7e 0c 0d a4 02 ..*....k.."~.... 23 e7 88 5d 73 0f 11 b7 c6 c8 e0 fe 4c 58 ce fe #..]s.......LX.. 1e 25 ba 67 51 fe 3a 7e 88 24 4f 6f 6c a6 67 17 .%.gQ.:~.$Ool.g. 1a c7 1d 2d 0f de 57 e3 a2 09 6a d2 99 62 6f 61 ...-..W...j..boa 1f 99 71 f9 bf f5 bc 0b 4d 20 1a 94 e2 37 d0 25 ..q.....M ...7.% Cookie: 0 (0x0000000000000000) ACK: true > Result: Frame (0x3b) len 12 8.994832 Cookie: 0 (0x0000000000000000) > Response: Frame (0x3b) len 4 [0x100] 8.994838 Status: Success (0) > Event: Frame (0x3b) len 184 8.998323 Wiphy: 0 (0x00000000) Interface Index: 3 (0x00000003) Wireless Device: 1 (0x0000000000000001) Wiphy Frequency: 2412 (0x0000096c) Unknown: 290 len 4 00 00 00 00 .... Frame: len 128 Frame Type: 0x00b0 Type: Management (0) Authentication: Frame Control: protocol: 00 type: 00 subtype: 11 to: 00 from: 00 more_frags: 00 retry: 00 power_mgmt: 00 more_data: 00 protected: 00 order: 00 Duration: 0 Address 1 (RA): DC:A6:32:B4:50:CF Address 2 (TA): D8:3A:DD:60:A3:0C Address 3: 00:00:00:00:00:00 Fragment Number: 0 Sequence Number: 0 Algorithm: SAE (seq: 1, status: 0) b0 00 00 00 dc a6 32 b4 50 cf d8 3a dd 60 a3 0c ......2.P..:.`.. 00 00 00 00 00 00 00 00 03 00 01 00 00 00 13 00 ................ f5 98 4d 58 4a ab 07 b0 94 42 17 f2 b1 4d 61 32 ..MXJ....B...Ma2 62 77 37 25 03 1a fa 60 4f 42 ba 7c 5f 03 8e 47 bw7%...`OB.|_..G 6e 70 c5 f5 53 d2 48 1e 3e cf a8 6a 57 61 4f 15 np..S.H.>..jWaO. a2 8a 95 b4 aa 91 79 3c 43 ec d7 b2 f7 db 1f 4a ......y<C......J 00 73 92 20 13 65 a2 82 fd 80 bf 3f d2 9d a2 6e .s. .e.....?...n ae 20 d5 fa 3e 3c 79 f9 61 cb 24 28 c1 af f9 6d . ..><y.a.$(...m RX Management Flags: 2 (0x00000002) < Request: Frame (0x3b) len 76 [ack] 9.001658 Interface Index: 3 (0x00000003) Frame: len 64 Frame Type: 0x00b0 Type: Management (0) Authentication: Frame Control: protocol: 00 type: 00 subtype: 11 to: 00 from: 00 more_frags: 00 retry: 00 power_mgmt: 00 more_data: 00 protected: 00 order: 00 Duration: 0 Address 1 (RA): D8:3A:DD:60:A3:0C Address 2 (TA): DC:A6:32:B4:50:CF Address 3: D8:3A:DD:60:A3:0C Fragment Number: 0 Sequence Number: 0 Algorithm: SAE (seq: 2, status: 0) IEs: len 34 Error decoding Supported rates IE len 0: Invalid argument (-22) b0 00 00 00 d8 3a dd 60 a3 0c dc a6 32 b4 50 cf .....:.`....2.P. d8 3a dd 60 a3 0c 00 00 03 00 02 00 00 00 01 00 .:.`............ 88 ef eb 55 73 42 11 0a 03 3b 6a 58 fb 6f 66 15 ...UsB...;jX.of. 82 f6 a7 b5 11 5a 0e 9e 72 ff 46 b8 bc 40 1b 39 .....Z..r.F..@.9 > Event: Frame TX Status (0x3c) len 112 9.004944 Wiphy: 0 (0x00000000) Interface Index: 3 (0x00000003) Wireless Device: 1 (0x0000000000000001) Frame: len 64 Frame Type: 0x00b0 Type: Management (0) Authentication: Frame Control: protocol: 00 type: 00 subtype: 11 to: 00 from: 00 more_frags: 00 retry: 00 power_mgmt: 00 more_data: 00 protected: 00 order: 00 Duration: 0 Address 1 (RA): D8:3A:DD:60:A3:0C Address 2 (TA): DC:A6:32:B4:50:CF Address 3: D8:3A:DD:60:A3:0C Fragment Number: 0 Sequence Number: 0 Algorithm: SAE (seq: 2, status: 0) IEs: len 34 Error decoding Supported rates IE len 0: Invalid argument (-22) b0 00 00 00 d8 3a dd 60 a3 0c dc a6 32 b4 50 cf .....:.`....2.P. d8 3a dd 60 a3 0c 00 00 03 00 02 00 00 00 01 00 .:.`............ 88 ef eb 55 73 42 11 0a 03 3b 6a 58 fb 6f 66 15 ...UsB...;jX.of. 82 f6 a7 b5 11 5a 0e 9e 72 ff 46 b8 bc 40 1b 39 .....Z..r.F..@.9 Cookie: 0 (0x0000000000000000) ACK: true > Result: Frame (0x3b) len 12 9.004955 Cookie: 0 (0x0000000000000000) > Response: Frame (0x3b) len 4 [0x100] 9.004960 Status: Success (0) > Event: Frame (0x3b) len 120 9.006097 Wiphy: 0 (0x00000000) Interface Index: 3 (0x00000003) Wireless Device: 1 (0x0000000000000001) Wiphy Frequency: 2412 (0x0000096c) Unknown: 290 len 4 00 00 00 00 .... Frame: len 64 Frame Type: 0x00b0 Type: Management (0) Authentication: Frame Control: protocol: 00 type: 00 subtype: 11 to: 00 from: 00 more_frags: 00 retry: 00 power_mgmt: 00 more_data: 00 protected: 00 order: 00 Duration: 0 Address 1 (RA): DC:A6:32:B4:50:CF Address 2 (TA): D8:3A:DD:60:A3:0C Address 3: 00:00:00:00:00:00 Fragment Number: 0 Sequence Number: 0 Algorithm: SAE (seq: 2, status: 0) IEs: len 34 Error decoding Supported rates IE len 0: Invalid argument (-22) b0 00 00 00 dc a6 32 b4 50 cf d8 3a dd 60 a3 0c ......2.P..:.`.. 00 00 00 00 00 00 00 00 03 00 02 00 00 00 01 00 ................ b1 52 e7 57 f0 0f 35 37 c9 db ef 96 f2 d6 33 e4 .R.W..57......3. b2 94 ac ea 71 a8 af 27 85 5d 9b d6 fb cb a7 04 ....q..'.]...... RX Management Flags: 2 (0x00000002) < Request: External Auth (0x7f) len 40 [ack] 9.006319 Interface Index: 3 (0x00000003) Status Code: 0 (0x0000) SSID: len 7 64 65 73 6b 53 41 45 deskSAE BSSID D8:3A:DD:60:A3:0C > Response: External Auth (0x7f) len 4 [0x100] 9.006934 Status: Success (0) > PAE: len 121 9.011410 Interface Index: 3 EAPoL: len 121 Protocol Version: 2 (802.1X-2004) Type: 3 (Key) Length: 117 Descriptor Type: 2 Key MIC: false Secure: false Error: false Request: false Encrypted Key Data: false SMK Message: false Key Descriptor Version: 0 (00) Key Type: true Install: false Key ACK: true Key Length: 16 Key Replay Counter: 1 Key NONCE 69 e3 46 27 40 86 15 c1 c4 ac f2 10 e7 6e 7f 40 i.F'@........n.@ 91 72 93 f6 a3 25 c7 4c a5 63 2d 9f 06 26 92 30 .r...%.L.c-..&.0 Key IV 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Key RSC 00 00 00 00 00 00 00 00 ........ Key MIC Data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Key Data: len 22 Vendor specific: len 20 IEEE 802.11 (00:0f:ac) type: 04 PMKID KDE 00 0f ac 04 86 03 03 1e ec bf 34 7f f3 bf 5e 99 ..........4...^. 48 c9 8e 8f H... 02 03 00 75 02 00 88 00 10 00 00 00 00 00 00 00 ...u............ 01 69 e3 46 27 40 86 15 c1 c4 ac f2 10 e7 6e 7f .i.F'@........n. 40 91 72 93 f6 a3 25 c7 4c a5 63 2d 9f 06 26 92 @.r...%.L.c-..&. 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 16 dd 14 00 0f ac 04 86 03 03 1e ec bf 34 ...............4 7f f3 bf 5e 99 48 c9 8e 8f ...^.H... > Event: Connect (0x2e) len 156 9.038941 Wiphy: 0 (0x00000000) Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C Status Code: 0 (0x0000) Request IE: len 80 SSID: deskSAE 64 65 73 6b 53 41 45 deskSAE Supported rates: 1.0(B) 2.0(B) 5.5(B) 11.0(B) 18.0 24.0 36.0 54.0 Mbit/s 82 84 8b 96 24 30 48 6c ....$0Hl Extended supported rates: 6.0 9.0 12.0 48.0 Mbit/s 0c 12 18 60 ...` Tag 33: len 2 03 14 .. Tag 36: len 2 01 0b .. RSN: Group Data Cipher Suite: len 4 CCMP (00:0f:ac) suite 04 Pairwise Cipher Suite: len 4 CCMP (00:0f:ac) suite 04 AKM Suite: len 4 SAE/PMKSA caching SHA256; RSNA PMKSA caching SHA256/mesh peering exchange (00:0f:ac) suite 08 RSN capabilities: bits 2 - 3: 1 replay counter per PTKSA RSN capabilities: bits 4 - 5: 1 replay counter per GTKSA RSN capabilities: bit 7: Management Frame Protection Capable 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................ ac 08 80 00 .... Extended Capabilities: len 8 Capability: bit 62: Opmode Notification 00 00 00 00 00 00 00 40 .......@ Vendor specific: len 9 Broadcom (00:10:18) type: 02 00 10 18 02 00 00 10 00 00 ......... SSID: SSID: Response IE: len 32 Supported rates: 1.0(B) 2.0(B) 5.5(B) 11.0(B) 6.0 9.0 12.0 18.0 Mbit/s 82 84 8b 96 0c 12 18 24 .......$ Extended supported rates: 24.0 36.0 48.0 54.0 Mbit/s 30 48 60 6c 0H`l Extended Capabilities: len 8 Capability: bit 2: Extended channel switching Capability: bit 62: Opmode Notification 04 00 00 00 00 00 00 40 .......@ > RTNL: New Link (0x10) len 128 9.038969 Flags: 0 (0x000) Sequence number: 0 (0x00000000) Port ID: 0 IFLA Family: Unknown IFLA Type: 1 IFLA Index: 3 IFLA ChangeMask: 0 IFLA Flags: (0x1043) [up,broadcast,running,multicast] IfName (len:6): wlan0 Wireless: len 96 60 00 07 8c 00 00 00 00 50 00 00 00 00 00 00 00 `.......P....... 00 07 64 65 73 6b 53 41 45 01 08 82 84 8b 96 24 ..deskSAE......$ 30 48 6c 32 04 0c 12 18 60 21 02 03 14 24 02 01 0Hl2....`!...$.. 0b 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 .0.............. 00 00 0f ac 08 80 00 7f 08 00 00 00 00 00 00 00 ................ 40 dd 09 00 10 18 02 00 00 10 00 00 00 00 00 00 @............... > RTNL: New Link (0x10) len 128 9.038975 Flags: 0 (0x000) Sequence number: 0 (0x00000000) Port ID: 0 IFLA Family: Unknown IFLA Type: 1 IFLA Index: 3 IFLA ChangeMask: 0 IFLA Flags: (0x1043) [up,broadcast,running,multicast] IfName (len:6): wlan0 Wireless: len 96 60 00 07 8c 00 00 00 00 50 00 00 00 00 00 00 00 `.......P....... 00 07 64 65 73 6b 53 41 45 01 08 82 84 8b 96 24 ..deskSAE......$ 30 48 6c 32 04 0c 12 18 60 21 02 03 14 24 02 01 0Hl2....`!...$.. 0b 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 .0.............. 00 00 0f ac 08 80 00 7f 08 00 00 00 00 00 00 00 ................ 40 dd 09 00 10 18 02 00 00 10 00 00 00 00 00 00 @............... > RTNL: New Link (0x10) len 128 9.038981 Flags: 0 (0x000) Sequence number: 0 (0x00000000) Port ID: 0 IFLA Family: Unknown IFLA Type: 1 IFLA Index: 3 IFLA ChangeMask: 0 IFLA Flags: (0x1043) [up,broadcast,running,multicast] IfName (len:6): wlan0 Wireless: len 96 60 00 07 8c 00 00 00 00 50 00 00 00 00 00 00 00 `.......P....... 00 07 64 65 73 6b 53 41 45 01 08 82 84 8b 96 24 ..deskSAE......$ 30 48 6c 32 04 0c 12 18 60 21 02 03 14 24 02 01 0Hl2....`!...$.. 0b 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 .0.............. 00 00 0f ac 08 80 00 7f 08 00 00 00 00 00 00 00 ................ 40 dd 09 00 10 18 02 00 00 10 00 00 00 00 00 00 @............... > RTNL: New Link (0x10) len 128 9.038987 Flags: 0 (0x000) Sequence number: 0 (0x00000000) Port ID: 0 IFLA Family: Unknown IFLA Type: 1 IFLA Index: 3 IFLA ChangeMask: 0 IFLA Flags: (0x1043) [up,broadcast,running,multicast] IfName (len:6): wlan0 Wireless: len 96 60 00 07 8c 00 00 00 00 50 00 00 00 00 00 00 00 `.......P....... 00 07 64 65 73 6b 53 41 45 01 08 82 84 8b 96 24 ..deskSAE......$ 30 48 6c 32 04 0c 12 18 60 21 02 03 14 24 02 01 0Hl2....`!...$.. 0b 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 .0.............. 00 00 0f ac 08 80 00 7f 08 00 00 00 00 00 00 00 ................ 40 dd 09 00 10 18 02 00 00 10 00 00 00 00 00 00 @............... > RTNL: New Link (0x10) len 80 9.039014 Flags: 0 (0x000) Sequence number: 0 (0x00000000) Port ID: 0 IFLA Family: Unknown IFLA Type: 1 IFLA Index: 3 IFLA ChangeMask: 0 IFLA Flags: (0x1043) [up,broadcast,running,multicast] IfName (len:6): wlan0 Wireless: len 48 30 00 08 8c 00 00 00 00 20 00 00 00 00 00 00 00 0....... ....... 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c .........$2.0H`l 7f 08 04 00 00 00 00 00 00 40 82 84 8b 96 24 30 .........@....$0 > RTNL: New Link (0x10) len 80 9.039019 Flags: 0 (0x000) Sequence number: 0 (0x00000000) Port ID: 0 IFLA Family: Unknown IFLA Type: 1 IFLA Index: 3 IFLA ChangeMask: 0 IFLA Flags: (0x1043) [up,broadcast,running,multicast] IfName (len:6): wlan0 Wireless: len 48 30 00 08 8c 00 00 00 00 20 00 00 00 00 00 00 00 0....... ....... 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c .........$2.0H`l 7f 08 04 00 00 00 00 00 00 40 82 84 8b 96 24 30 .........@....$0 > RTNL: New Link (0x10) len 80 9.039022 Flags: 0 (0x000) Sequence number: 0 (0x00000000) Port ID: 0 IFLA Family: Unknown IFLA Type: 1 IFLA Index: 3 IFLA ChangeMask: 0 IFLA Flags: (0x1043) [up,broadcast,running,multicast] IfName (len:6): wlan0 Wireless: len 48 30 00 08 8c 00 00 00 00 20 00 00 00 00 00 00 00 0....... ....... 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c .........$2.0H`l 7f 08 04 00 00 00 00 00 00 40 82 84 8b 96 24 30 .........@....$0 > RTNL: New Link (0x10) len 80 9.039024 Flags: 0 (0x000) Sequence number: 0 (0x00000000) Port ID: 0 IFLA Family: Unknown IFLA Type: 1 IFLA Index: 3 IFLA ChangeMask: 0 IFLA Flags: (0x1043) [up,broadcast,running,multicast] IfName (len:6): wlan0 Wireless: len 48 30 00 08 8c 00 00 00 00 20 00 00 00 00 00 00 00 0....... ....... 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c .........$2.0H`l 7f 08 04 00 00 00 00 00 00 40 82 84 8b 96 24 30 .........@....$0 > RTNL: New Link (0x10) len 56 9.039028 Flags: 0 (0x000) Sequence number: 0 (0x00000000) Port ID: 0 IFLA Family: Unknown IFLA Type: 1 IFLA Index: 3 IFLA ChangeMask: 0 IFLA Flags: (0x1043) [up,broadcast,running,multicast] IfName (len:6): wlan0 Wireless: len 24 18 00 15 8b 00 00 00 00 01 00 d8 3a dd 60 a3 0c ...........:.`.. 00 00 00 00 00 00 00 00 ........ > RTNL: New Link (0x10) len 56 9.039031 Flags: 0 (0x000) Sequence number: 0 (0x00000000) Port ID: 0 IFLA Family: Unknown IFLA Type: 1 IFLA Index: 3 IFLA ChangeMask: 0 IFLA Flags: (0x1043) [up,broadcast,running,multicast] IfName (len:6): wlan0 Wireless: len 24 18 00 15 8b 00 00 00 00 01 00 d8 3a dd 60 a3 0c ...........:.`.. 00 00 00 00 00 00 00 00 ........ > RTNL: New Link (0x10) len 56 9.039033 Flags: 0 (0x000) Sequence number: 0 (0x00000000) Port ID: 0 IFLA Family: Unknown IFLA Type: 1 IFLA Index: 3 IFLA ChangeMask: 0 IFLA Flags: (0x1043) [up,broadcast,running,multicast] IfName (len:6): wlan0 Wireless: len 24 18 00 15 8b 00 00 00 00 01 00 d8 3a dd 60 a3 0c ...........:.`.. 00 00 00 00 00 00 00 00 ........ > RTNL: New Link (0x10) len 56 9.039036 Flags: 0 (0x000) Sequence number: 0 (0x00000000) Port ID: 0 IFLA Family: Unknown IFLA Type: 1 IFLA Index: 3 IFLA ChangeMask: 0 IFLA Flags: (0x1043) [up,broadcast,running,multicast] IfName (len:6): wlan0 Wireless: len 24 18 00 15 8b 00 00 00 00 01 00 d8 3a dd 60 a3 0c ...........:.`.. 00 00 00 00 00 00 00 00 ........ < Request: Get Interface (0x05) len 8 [ack] 9.039049 Interface Index: 3 (0x00000003) > Result: New Interface (0x07) len 136 9.040544 Interface Index: 3 (0x00000003) Interface Name: wlan0 Wiphy: 0 (0x00000000) Interface Type: 2 (0x00000002) Wireless Device: 1 (0x0000000000000001) MAC Address DC:A6:32:B4:50:CF Generation: 5 (0x00000005) 4-Address: 0 (0x00) Wiphy Frequency: 2412 (0x0000096c) Unknown: 290 len 4 00 00 00 00 .... Wiphy Channel Type: 1 (0x00000001) Channel Width: 1 (0x00000001) Center Frequency 1: 2412 (0x0000096c) Wiphy TX Power Level: 3100 (0x00000c1c) SSID: len 7 64 65 73 6b 53 41 45 deskSAE < PAE: len 121 9.040843 Interface Index: 3 EAPoL: len 121 Protocol Version: 2 (802.1X-2004) Type: 3 (Key) Length: 117 Descriptor Type: 2 Key MIC: true Secure: false Error: false Request: false Encrypted Key Data: false SMK Message: false Key Descriptor Version: 0 (00) Key Type: true Install: false Key ACK: false Key Length: 0 Key Replay Counter: 1 Key NONCE 86 bb 22 3c 63 05 0e 41 21 ec 49 21 5d f9 94 06 .."<c..A!.I!]... 2a a7 1e 55 f7 14 fc ea 07 e4 2c 4e 39 81 03 2a *..U......,N9..* Key IV 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Key RSC 00 00 00 00 00 00 00 00 ........ Key MIC Data 22 8e 84 f2 f9 91 4d 27 7b e6 96 a9 91 df 0f 8a ".....M'{....... Key Data: len 22 RSN: Group Data Cipher Suite: len 4 CCMP (00:0f:ac) suite 04 Pairwise Cipher Suite: len 4 CCMP (00:0f:ac) suite 04 AKM Suite: len 4 SAE/PMKSA caching SHA256; RSNA PMKSA caching SHA256/mesh peering exchange (00:0f:ac) suite 08 RSN capabilities: bits 2 - 3: 1 replay counter per PTKSA RSN capabilities: bits 4 - 5: 1 replay counter per GTKSA RSN capabilities: bit 7: Management Frame Protection Capable 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................ ac 08 80 00 .... 02 03 00 75 02 01 08 00 00 00 00 00 00 00 00 00 ...u............ 01 86 bb 22 3c 63 05 0e 41 21 ec 49 21 5d f9 94 ..."<c..A!.I!].. 06 2a a7 1e 55 f7 14 fc ea 07 e4 2c 4e 39 81 03 .*..U......,N9.. 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 *............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 22 8e 84 f2 f9 91 4d 27 7b e6 96 a9 91 df 0f .".....M'{...... 8a 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac ...0............ 04 01 00 00 0f ac 08 80 00 ......... > Response: Get Interface (0x05) len 4 [0x100] 9.040560 Status: Success (0) > PAE: len 187 9.045312 Interface Index: 3 EAPoL: len 187 Protocol Version: 2 (802.1X-2004) Type: 3 (Key) Length: 183 Descriptor Type: 2 Key MIC: true Secure: true Error: false Request: false Encrypted Key Data: true SMK Message: false Key Descriptor Version: 0 (00) Key Type: true Install: true Key ACK: true Key Length: 16 Key Replay Counter: 2 Key NONCE 69 e3 46 27 40 86 15 c1 c4 ac f2 10 e7 6e 7f 40 i.F'@........n.@ 91 72 93 f6 a3 25 c7 4c a5 63 2d 9f 06 26 92 30 .r...%.L.c-..&.0 Key IV 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Key RSC 00 00 00 00 00 00 00 00 ........ Key MIC Data bf 8a 76 5a 0f 46 3a 68 9f 64 11 ae 2a 1d 8f fc ..vZ.F:h.d..*... Key Data: len 88 e4 d6 c3 61 7b a1 65 5d 99 f9 db f2 d1 69 fa e2 ...a{.e].....i.. 26 f3 b2 6f 35 0a ef 16 5b 80 35 0a e6 39 24 06 &..o5...[.5..9$. 56 f7 98 84 7b c5 d8 3d d2 22 96 58 38 10 ff b2 V...{..=.".X8... 87 54 2b 62 da 64 3b 2a 61 a0 71 22 c4 97 01 b2 .T+b.d;*a.q".... c4 54 92 60 a3 bd 12 0b 96 d8 7a 20 f0 78 69 90 .T.`......z .xi. a3 b4 19 d5 21 f5 3a 56 ....!.:V 02 03 00 b7 02 13 c8 00 10 00 00 00 00 00 00 00 ................ 02 69 e3 46 27 40 86 15 c1 c4 ac f2 10 e7 6e 7f .i.F'@........n. 40 91 72 93 f6 a3 25 c7 4c a5 63 2d 9f 06 26 92 @.r...%.L.c-..&. 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 bf 8a 76 5a 0f 46 3a 68 9f 64 11 ae 2a 1d 8f ...vZ.F:h.d..*.. fc 00 58 e4 d6 c3 61 7b a1 65 5d 99 f9 db f2 d1 ..X...a{.e]..... 69 fa e2 26 f3 b2 6f 35 0a ef 16 5b 80 35 0a e6 i..&..o5...[.5.. 39 24 06 56 f7 98 84 7b c5 d8 3d d2 22 96 58 38 9$.V...{..=.".X8 10 ff b2 87 54 2b 62 da 64 3b 2a 61 a0 71 22 c4 ....T+b.d;*a.q". 97 01 b2 c4 54 92 60 a3 bd 12 0b 96 d8 7a 20 f0 ....T.`......z . 78 69 90 a3 b4 19 d5 21 f5 3a 56 xi.....!.:V < PAE: len 99 9.046063 Interface Index: 3 EAPoL: len 99 Protocol Version: 2 (802.1X-2004) Type: 3 (Key) Length: 95 Descriptor Type: 2 Key MIC: true Secure: true Error: false Request: false Encrypted Key Data: false SMK Message: false Key Descriptor Version: 0 (00) Key Type: true Install: false Key ACK: false Key Length: 0 Key Replay Counter: 2 Key NONCE 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Key IV 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Key RSC 00 00 00 00 00 00 00 00 ........ Key MIC Data f1 89 02 85 dd 01 15 bb 1d b3 14 c3 1e ec 69 a5 ..............i. Key Data: len 0 02 03 00 5f 02 03 08 00 00 00 00 00 00 00 00 00 ..._............ 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 f1 89 02 85 dd 01 15 bb 1d b3 14 c3 1e ec 69 ...............i a5 00 00 ... < Request: New Key (0x0b) len 76 [ack] 9.046411 Interface Index: 3 (0x00000003) Key: len 64 Key Data: len 16 79 5a 9f 8b ff b5 ca 7f bd 0c 83 a0 bd 5d 6a d9 yZ...........]j. Key Cipher: CCMP (00:0f:ac) suite 04 Key Index: 1 (0x01) Key Sequence: len 6 00 00 00 00 00 00 ...... Key Type: Group Default Key Types: len 4 Multicast: true > Response: New Key (0x0b) len 4 [0x100] 9.049672 Status: Success (0) < Request: New Key (0x0b) len 76 [ack] 9.050445 Interface Index: 3 (0x00000003) Key: len 64 Key Data: len 16 78 1b ea 4b c6 8b 6a d2 96 df 6a 87 b0 0b 05 0d x..K..j...j..... Key Cipher: BIP (00:0f:ac) suite 06 Key Index: 4 (0x04) Key Sequence: len 6 00 00 00 00 00 00 ...... Key Type: Group Default Key Types: len 4 Multicast: true > Response: New Key (0x0b) len 4 [0x100] 9.053432 Status: Success (0) < Request: New Key (0x0b) len 56 [ack] 9.053557 Key Data: len 16 46 4b 1e 70 6b 34 e5 f5 f8 3a 8c ab 45 3f 0c a5 FK.pk4...:..E?.. Key Cipher: CCMP (00:0f:ac) suite 04 MAC Address D8:3A:DD:60:A3:0C Key Index: 0 (0x00) Interface Index: 3 (0x00000003) > Response: New Key (0x0b) len 4 [0x100] 9.054111 Status: Success (0) < Request: Set Station (0x12) len 32 [ack] 9.054156 Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C Station Flags 2: len 8 Mask: 0x00000002 Authorized Set: 0x00000002 Authorized > Response: Set Station (0x12) len 4 [root] 9.054419 Status: Success (0) < RTNL: Set Link (0x13) len 32 [request,ack] 9.077705 Flags: 5 (0x005) Sequence number: 6 (0x00000006) Port ID: 2259036 IFLA Family: Unknown IFLA Type: 0 IFLA Index: 3 IFLA ChangeMask: 0 IFLA Flags: (0x00) LinkMode: userspace controlled (1) OperState: up (6) > RTNL: Error (0x02) len 20 [0x100] 9.077727 Flags: 256 (0x100) Sequence number: 6 (0x00000006) Port ID: 2259036 ACK: 0 > RTNL: New Address (0x14) len 64 [multi] 9.077812 Flags: 2 (0x002) Sequence number: 10 (0x0000000a) Port ID: 2933307082 IFA Family: AF_INET6 IFA Prefixlen: 64 IFA Index: 3 IFA Scope: link IFA Flags: (0x80) [permanent] Interface Address: fe80::dea6:32ff:feb4:50cf CacheInfo: ifa_prefered: infinite ifa_valid: infinite tstamp: 18687235, cstamp: 18687235 Flags: (0x80) [permanent] Reserved: len 1 > RTNL: Done (0x03) len 4 [multi] 9.077879 Flags: 2 (0x002) Sequence number: 10 (0x0000000a) Port ID: 2933307082 Status: 0 < Request: Get Station (0x11) len 20 [ack] 9.950486 Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C > Result: New Station (0x13) len 172 9.955278 Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C Generation: 0 (0x00000000) Station Info: len 140 Connected time: 0 (0x00000000) Inactivity time: 0 (0x00000000) Total RX bytes: 498 (0x000001f2) Total TX bytes: 1144 (0x00000478) Signal strength: -62 TX bitrate: len 16 Bit Rate: 540 (0x0000021c) Bit Rate (Legacy): 540 (0x021c) RX bitrate: len 16 Bit Rate: 180 (0x000000b4) Bit Rate (Legacy): 180 (0x00b4) RX packets: 3 (0x00000003) TX packets: 6 (0x00000006) TX failed: 0 (0x00000000) BSS parameters: len 20 Short Slot Time: true DTIM Period: 2 (0x02) Beacon Interval: 100 (0x0064) Station flags: len 8 Mask: 0x000000ea Authorized WME Authenticated TDLS-Peer Associated Set: 0x000000a2 Authorized Authenticated Associated > Response: Get Station (0x11) len 4 [0x100] 9.955288 Status: Success (0) < RTNL: New Address (0x14) len 52 [request,replace,create] 12.084427 Flags: 1281 (0x501) Sequence number: 11 (0x0000000b) Port ID: 2933307082 IFA Family: AF_INET IFA Prefixlen: 24 IFA Index: 3 IFA Scope: global IFA Flags: (0x80) [permanent] Local Address: 192.168.5.225 Broadcast Address: 192.168.5.255 Flags: (0x200) [noprefixroute] CacheInfo: ifa_prefered: 86399 ifa_valid: 86399 tstamp: 0, cstamp: 0 > RTNL: New Address (0x14) len 72 12.084458 Flags: 0 (0x000) Sequence number: 11 (0x0000000b) Port ID: 2933307082 IFA Family: AF_INET IFA Prefixlen: 24 IFA Index: 3 IFA Scope: global IFA Flags: (0x00) Interface Address: 192.168.5.225 Local Address: 192.168.5.225 Broadcast Address: 192.168.5.255 Label (len:6): wlan0 Flags: (0x200) [noprefixroute] CacheInfo: ifa_prefered: 86399 ifa_valid: 86399 tstamp: 18731704, cstamp: 18731704 > RTNL: New Address (0x14) len 72 12.084463 Flags: 0 (0x000) Sequence number: 11 (0x0000000b) Port ID: 2933307082 IFA Family: AF_INET IFA Prefixlen: 24 IFA Index: 3 IFA Scope: global IFA Flags: (0x00) Interface Address: 192.168.5.225 Local Address: 192.168.5.225 Broadcast Address: 192.168.5.255 Label (len:6): wlan0 Flags: (0x200) [noprefixroute] CacheInfo: ifa_prefered: 86399 ifa_valid: 86399 tstamp: 18731704, cstamp: 18731704 > RTNL: New Address (0x14) len 72 12.084470 Flags: 0 (0x000) Sequence number: 11 (0x0000000b) Port ID: 2933307082 IFA Family: AF_INET IFA Prefixlen: 24 IFA Index: 3 IFA Scope: global IFA Flags: (0x00) Interface Address: 192.168.5.225 Local Address: 192.168.5.225 Broadcast Address: 192.168.5.255 Label (len:6): wlan0 Flags: (0x200) [noprefixroute] CacheInfo: ifa_prefered: 86399 ifa_valid: 86399 tstamp: 18731704, cstamp: 18731704 > RTNL: New Address (0x14) len 72 12.084476 Flags: 0 (0x000) Sequence number: 11 (0x0000000b) Port ID: 2933307082 IFA Family: AF_INET IFA Prefixlen: 24 IFA Index: 3 IFA Scope: global IFA Flags: (0x00) Interface Address: 192.168.5.225 Local Address: 192.168.5.225 Broadcast Address: 192.168.5.255 Label (len:6): wlan0 Flags: (0x200) [noprefixroute] CacheInfo: ifa_prefered: 86399 ifa_valid: 86399 tstamp: 18731704, cstamp: 18731704 > RTNL: New Address (0x14) len 72 12.084480 Flags: 0 (0x000) Sequence number: 11 (0x0000000b) Port ID: 2933307082 IFA Family: AF_INET IFA Prefixlen: 24 IFA Index: 3 IFA Scope: global IFA Flags: (0x00) Interface Address: 192.168.5.225 Local Address: 192.168.5.225 Broadcast Address: 192.168.5.255 Label (len:6): wlan0 Flags: (0x200) [noprefixroute] CacheInfo: ifa_prefered: 86399 ifa_valid: 86399 tstamp: 18731704, cstamp: 18731704 < RTNL: New Route (0x18) len 44 [request,replace,create] 12.086445 Flags: 1281 (0x501) Sequence number: 12 (0x0000000c) Port ID: 2933307082 RTM Family: AF_INET RTM Destination Len: 24 RTM Source Len: 0 RTM TOS Field: 0 RTM Table: 254 RTM Protocol: dhcp RTM Scope: link RTM Type: 1 RTM Flags: (0x00) Output Interface Index: 3 Priority of the route: 303 Destination Address: 192.168.5.0 Route lifetime: 86399 (0x0001517f) > RTNL: New Route (0x18) len 44 [excl,create] 12.086771 Flags: 1536 (0x600) Sequence number: 12 (0x0000000c) Port ID: 2933307082 RTM Family: AF_INET RTM Destination Len: 24 RTM Source Len: 0 RTM TOS Field: 0 RTM Table: 254 RTM Protocol: dhcp RTM Scope: link RTM Type: 1 RTM Flags: (0x00) Routing Table: 254 (0x000000fe) Destination Address: 192.168.5.0 Priority of the route: 303 Output Interface Index: 3 < RTNL: New Route (0x18) len 52 [request,replace,create] 12.086829 Flags: 1281 (0x501) Sequence number: 13 (0x0000000d) Port ID: 2933307082 RTM Family: AF_INET RTM Destination Len: 0 RTM Source Len: 0 RTM TOS Field: 0 RTM Table: 254 RTM Protocol: dhcp RTM Scope: global RTM Type: 1 RTM Flags: (0x00) Output Interface Index: 3 Priority of the route: 303 Gateway: 192.168.5.1 Preferred Source: 192.168.5.225 Route lifetime: 86399 (0x0001517f) > RTNL: New Route (0x18) len 52 [excl,create] 12.086849 Flags: 1536 (0x600) Sequence number: 13 (0x0000000d) Port ID: 2933307082 RTM Family: AF_INET RTM Destination Len: 0 RTM Source Len: 0 RTM TOS Field: 0 RTM Table: 254 RTM Protocol: dhcp RTM Scope: global RTM Type: 1 RTM Flags: (0x00) Routing Table: 254 (0x000000fe) Priority of the route: 303 Preferred Source: 192.168.5.225 Gateway: 192.168.5.1 Output Interface Index: 3 > RTNL: Error (0x02) len 20 [0x100] 12.086894 Flags: 256 (0x100) Sequence number: 14 (0x0000000e) Port ID: 2933307082 ACK: 0 > RTNL: Error (0x02) len 20 [0x100] 12.086916 Flags: 256 (0x100) Sequence number: 15 (0x0000000f) Port ID: 2933307082 ACK: 0
Jan 22 19:57:56 Pi4 connmand[53107]: Interface wlan0 [ wifi ] state is association Jan 22 19:57:56 Pi4 iwd[2259036]: src/network.c:network_connect() Jan 22 19:57:56 Pi4 iwd[2259036]: src/wiphy.c:wiphy_select_akm() Network is WPA3-Personal... Jan 22 19:57:56 Pi4 iwd[2259036]: event: connect-info, FullMAC driver: brcmfmac using SAE. Expect EXTERNAL_AUTH Jan 22 19:57:56 Pi4 iwd[2259036]: src/network.c:network_connect_psk() ask_passphrase: true Jan 22 19:57:56 Pi4 iwd[2259036]: src/agent.c:agent_request_passphrase() agent 0x5596df5f90 owner :1.1969 path /net/connman/iwd_agent Jan 22 19:57:56 Pi4 iwd[2259036]: src/agent.c:agent_send_next_request() send request to :1.1969 /net/connman/iwd_agent Jan 22 19:57:56 Pi4 iwd[2259036]: src/agent.c:agent_receive_reply() agent 0x5596df5f90 request id 297 Jan 22 19:57:56 Pi4 iwd[2259036]: src/network.c:passphrase_callback() result 0 Jan 22 19:57:56 Pi4 iwd[2259036]: src/wiphy.c:wiphy_select_akm() Network is WPA3-Personal... Jan 22 19:57:56 Pi4 iwd[2259036]: event: connect-info, FullMAC driver: brcmfmac using SAE. Expect EXTERNAL_AUTH Jan 22 19:57:56 Pi4 iwd[2259036]: src/network.c:network_generate_sae_pt() Generating PT for Group 19 Jan 22 19:57:56 Pi4 iwd[2259036]: src/network.c:network_generate_sae_pt() Generating PT for Group 20 Jan 22 19:57:56 Pi4 iwd[2259036]: src/wiphy.c:wiphy_select_akm() Network is WPA3-Personal... Jan 22 19:57:56 Pi4 iwd[2259036]: event: connect-info, FullMAC driver: brcmfmac using SAE. Expect EXTERNAL_AUTH Jan 22 19:57:56 Pi4 iwd[2259036]: src/netdev.c:netdev_cqm_rssi_update() Jan 22 19:57:56 Pi4 iwd[2259036]: src/wiphy.c:wiphy_radio_work_insert() Inserting work item 17 Jan 22 19:57:56 Pi4 iwd[2259036]: src/wiphy.c:wiphy_radio_work_next() Starting work item 17 Jan 22 19:57:56 Pi4 iwd[2259036]: event: connect-info, ssid: deskSAE, bss: d8:3a:dd:60:a3:0c, signal: -59, load: 0/255 Jan 22 19:57:56 Pi4 iwd[2259036]: event: state, old: disconnected, new: connecting Jan 22 19:57:56 Pi4 iwd[2259036]: src/netdev.c:netdev_cmd_set_cqm_cb() CMD_SET_CQM not supported, falling back to polling Jan 22 19:57:56 Pi4 connmand[53107]: Interface wlan0 [ wifi ] state is configuration Jan 22 19:57:56 Pi4 iwd[2259036]: src/netdev.c:netdev_unicast_notify() Unicast notification External Auth(127) Jan 22 19:57:56 Pi4 iwd[2259036]: event: connect-info, External Auth to SSID: deskSAE, bssid: d8:3a:dd:60:a3:0c Jan 22 19:57:56 Pi4 iwd[2259036]: src/netdev.c:netdev_external_auth_sae_tx_authenticate() Jan 22 19:57:56 Pi4 iwd[2259036]: src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60) Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_external_auth_sae_tx_authenticate() Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_unicast_notify() Unicast notification Frame(59) Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60) Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_external_auth_sae_tx_associate() Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_unicast_notify() Unicast notification Frame(59) Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_mlme_notify() MLME notification Connect(46) Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_connect_event() Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_connect_event() aborting and ignore_connect_event not set, proceed Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_connect_event() expect_connect_failure not set, proceed Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:parse_request_ies() Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_connect_event() Request / Response IEs parsed Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_get_oci() Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_link_notify() event 16 on ifindex 3 Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_get_oci_cb() Obtained OCI: freq: 2412, width: 1, center1: 2412, center2: 0 Jan 22 19:57:57 Pi4 iwd[2259036]: src/eapol.c:eapol_start() Jan 22 19:57:57 Pi4 iwd[2259036]: src/station.c:station_handshake_event() Handshaking Jan 22 19:57:57 Pi4 iwd[2259036]: src/eapol.c:eapol_handle_ptk_1_of_4() ifindex=3 Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_link_notify() event 16 on ifindex 3 Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_link_notify() event 16 on ifindex 3 Jan 22 19:57:57 Pi4 iwd[2259036]: src/eapol.c:eapol_handle_ptk_3_of_4() ifindex=3 Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_set_gtk() ifindex=3 key_idx=1 Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_set_igtk() ifindex=3 key_idx=4 Jan 22 19:57:57 Pi4 iwd[2259036]: src/handshake.c:handshake_state_install_ptk() Adding PMKSA expiration Jan 22 19:57:57 Pi4 iwd[2259036]: src/station.c:station_handshake_event() Setting keys Jan 22 19:57:57 Pi4 iwd[2259036]: src/network.c:network_sync_settings() Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_set_tk() ifindex=3 key_idx=0 Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_new_group_key_cb() ifindex: 3, err: 0 Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:try_handshake_complete() ptk_installed: 0, gtk_installed: 1, igtk_installed: 0 Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_new_group_management_key_cb() ifindex: 3, err: 0 Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:try_handshake_complete() ptk_installed: 0, gtk_installed: 1, igtk_installed: 1 Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_set_station_cb() Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:try_handshake_complete() ptk_installed: 1, gtk_installed: 1, igtk_installed: 1 Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:try_handshake_complete() nhs->complete: 0 Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:try_handshake_complete() Invoking handshake_event() Jan 22 19:57:57 Pi4 iwd[2259036]: src/handshake.c:handshake_state_cache_pmksa() Caching PMKSA for d8:3a:dd:60:a3:0c Jan 22 19:57:57 Pi4 iwd[2259036]: src/pmksa.c:pmksa_cache_put() Adding entry with PMKID: 8603031eecbf347ff3bf5e9948c98e8f Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_connect_ok() Jan 22 19:57:57 Pi4 iwd[2259036]: src/station.c:station_connect_cb() 3, result: 0 Jan 22 19:57:57 Pi4 iwd[2259036]: src/station.c:station_connect_ok() Jan 22 19:57:57 Pi4 iwd[2259036]: event: state, old: connecting, new: connecting (netconfig) Jan 22 19:57:57 Pi4 iwd[2259036]: src/wiphy.c:wiphy_radio_work_done() Work item 17 done Jan 22 19:58:00 Pi4 iwd[2259036]: src/netconfig.c:netconfig_event_handler() l_netconfig event 0 Jan 22 19:58:00 Pi4 iwd[2259036]: src/netconfig-commit.c:netconfig_commit_print_addrs() installing address: 192.168.5.225 Jan 22 19:58:00 Pi4 iwd[2259036]: src/resolve.c:resolve_systemd_set_dns() ifindex: 3 Jan 22 19:58:00 Pi4 iwd[2259036]: src/resolve.c:systemd_builder_add_dns() installing DNS: 192.168.5.1 Jan 22 19:58:00 Pi4 iwd[2259036]: event: state, old: connecting (netconfig), new: connected Jan 22 19:58:00 Pi4 iwd[2259036]: src/netconfig-commit.c:netconfig_dhcp_gateway_to_arp() Gateway MAC is known, setting into ARP cache Jan 22 19:58:00 Pi4 connmand[53107]: wlan0 {add} address 192.168.5.225/24 label wlan0 family 2 Jan 22 19:58:00 Pi4 systemd-resolved[346]: wlan0: Bus client set DNS server list to: 192.168.5.1 Jan 22 19:58:07 Pi4 connmand[53107]: Interface wlan0 [ wifi ] state is ready Jan 22 19:58:07 Pi4 iwd[2259036]: src/netconfig.c:netconfig_event_handler() l_netconfig event 3
Wireless monitor ver 3.3 Created interface nlmon > Response: Set CQM (0x3f) len 4 9.192213 Status: Operation not supported (95) < Request: Connect (0x2e) len 164 [ack] 9.192280 Interface Index: 3 (0x00000003) Wiphy Frequency: 2412 (0x0000096c) MAC Address D8:3A:DD:60:A3:0C SSID: len 7 64 65 73 6b 53 41 45 deskSAE Auth Type: 0 (0x00000000) External Auth Support: 261 len 0 Privacy: true Socket Owns Interface/Connection: true Cipher Suites Pairwise: CCMP (00:0f:ac) suite 04 Cipher Suite Group: CCMP (00:0f:ac) suite 04 Use MFP: 1 (0x00000001) AKM Suites: SAE/PMKSA caching SHA256; RSNA PMKSA caching SHA256/mesh peering exchange (00:0f:ac) suite 08 WPA Versions: 4 (0x00000004) Control Port: true Information Elements: len 56 RSN: Group Data Cipher Suite: len 4 CCMP (00:0f:ac) suite 04 Pairwise Cipher Suite: len 4 CCMP (00:0f:ac) suite 04 AKM Suite: len 4 SAE/PMKSA caching SHA256; RSNA PMKSA caching SHA256/mesh peering exchange (00:0f:ac) suite 08 RSN capabilities: bits 2 - 3: 1 replay counter per PTKSA RSN capabilities: bits 4 - 5: 1 replay counter per GTKSA RSN capabilities: bit 7: Management Frame Protection Capable PMKID: dc:12:25:e2:88:92:74:53:b9:87:9a:01:d4:7d:7a:f5 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................ ac 08 80 00 01 00 dc 12 25 e2 88 92 74 53 b9 87 ........%...tS.. 9a 01 d4 7d 7a f5 ...}z. Extended Capabilities: len 10 Capability: bit 19: BSS transition 00 00 08 00 00 00 00 00 00 01 .......... Tag 262: len 1 1a . > Response: Connect (0x2e) len 4 [0x100] 9.216865 Status: Success (0) > Event: External Auth (0x7f) len 56 9.309833 Wiphy: 0 (0x00000000) Interface Index: 3 (0x00000003) AKM Suites: unknown (08:ac:0f) suite 00 (unknown) External Auth Action: 260 len 4 00 00 00 00 .... BSSID D8:3A:DD:60:A3:0C SSID: len 7 64 65 73 6b 53 41 45 deskSAE < Request: External Auth (0x7f) len 40 [ack] 9.309988 Interface Index: 3 (0x00000003) Status Code: 1 (0x0001) SSID: len 7 64 65 73 6b 53 41 45 deskSAE BSSID D8:3A:DD:60:A3:0C > Response: External Auth (0x7f) len 4 [0x100] 9.310399 Status: Success (0) < Request: Get Station (0x11) len 20 [ack] 10.192319 Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C > Result: New Station (0x13) len 92 10.196490 Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C Generation: 0 (0x00000000) Station Info: len 60 Inactivity time: 0 (0x00000000) Total RX bytes: 0 (0x00000000) Total TX bytes: 0 (0x00000000) RX packets: 0 (0x00000000) TX packets: 0 (0x00000000) TX failed: 0 (0x00000000) Station flags: len 8 Mask: 0x000000ea Authorized WME Authenticated TDLS-Peer Associated Set: 0x00000000 > Response: Get Station (0x11) len 4 [0x100] 10.196500 Status: Success (0) < Request: Get Station (0x11) len 20 [ack] 16.196580 Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C > Result: New Station (0x13) len 92 16.200751 Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C Generation: 0 (0x00000000) Station Info: len 60 Inactivity time: 6000 (0x00001770) Total RX bytes: 0 (0x00000000) Total TX bytes: 0 (0x00000000) RX packets: 0 (0x00000000) TX packets: 0 (0x00000000) TX failed: 0 (0x00000000) Station flags: len 8 Mask: 0x000000ea Authorized WME Authenticated TDLS-Peer Associated Set: 0x00000000 > Response: Get Station (0x11) len 4 [0x100] 16.200761 Status: Success (0) < Request: Get Station (0x11) len 20 [ack] 22.200838 Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C > Result: New Station (0x13) len 92 22.204958 Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C Generation: 0 (0x00000000) Station Info: len 60 Inactivity time: 12000 (0x00002ee0) Total RX bytes: 0 (0x00000000) Total TX bytes: 0 (0x00000000) RX packets: 0 (0x00000000) TX packets: 0 (0x00000000) TX failed: 0 (0x00000000) Station flags: len 8 Mask: 0x000000ea Authorized WME Authenticated TDLS-Peer Associated Set: 0x00000000 > Response: Get Station (0x11) len 4 [0x100] 22.204968 Status: Success (0) < Request: Get Station (0x11) len 20 [ack] 28.205049 Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C > Result: New Station (0x13) len 92 28.209165 Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C Generation: 0 (0x00000000) Station Info: len 60 Inactivity time: 18000 (0x00004650) Total RX bytes: 0 (0x00000000) Total TX bytes: 0 (0x00000000) RX packets: 0 (0x00000000) TX packets: 0 (0x00000000) TX failed: 0 (0x00000000) Station flags: len 8 Mask: 0x000000ea Authorized WME Authenticated TDLS-Peer Associated Set: 0x00000000 > Response: Get Station (0x11) len 4 [0x100] 28.209174 Status: Success (0) < Request: Get Station (0x11) len 20 [ack] 34.209261 Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C > Result: New Station (0x13) len 92 34.213367 Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C Generation: 0 (0x00000000) Station Info: len 60 Inactivity time: 24000 (0x00005dc0) Total RX bytes: 0 (0x00000000) Total TX bytes: 0 (0x00000000) RX packets: 0 (0x00000000) TX packets: 0 (0x00000000) TX failed: 0 (0x00000000) Station flags: len 8 Mask: 0x000000ea Authorized WME Authenticated TDLS-Peer Associated Set: 0x00000000 > Response: Get Station (0x11) len 4 [0x100] 34.213378 Status: Success (0) < Request: Get Station (0x11) len 20 [ack] 40.213458 Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C > Result: New Station (0x13) len 92 40.217595 Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C Generation: 0 (0x00000000) Station Info: len 60 Inactivity time: 30000 (0x00007530) Total RX bytes: 0 (0x00000000) Total TX bytes: 0 (0x00000000) RX packets: 0 (0x00000000) TX packets: 0 (0x00000000) TX failed: 0 (0x00000000) Station flags: len 8 Mask: 0x000000ea Authorized WME Authenticated TDLS-Peer Associated Set: 0x00000000 > Response: Get Station (0x11) len 4 [0x100] 40.217604 Status: Success (0) < Request: Get Station (0x11) len 20 [ack] 46.217682 Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C > Result: New Station (0x13) len 92 46.221795 Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C Generation: 0 (0x00000000) Station Info: len 60 Inactivity time: 36000 (0x00008ca0) Total RX bytes: 0 (0x00000000) Total TX bytes: 0 (0x00000000) RX packets: 0 (0x00000000) TX packets: 0 (0x00000000) TX failed: 0 (0x00000000) Station flags: len 8 Mask: 0x000000ea Authorized WME Authenticated TDLS-Peer Associated Set: 0x00000000 > Response: Get Station (0x11) len 4 [0x100] 46.221805 Status: Success (0) < Request: Get Station (0x11) len 20 [ack] 52.221886 Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C > Result: New Station (0x13) len 92 52.225105 Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C Generation: 0 (0x00000000) Station Info: len 60 Inactivity time: 42000 (0x0000a410) Total RX bytes: 0 (0x00000000) Total TX bytes: 0 (0x00000000) RX packets: 0 (0x00000000) TX packets: 0 (0x00000000) TX failed: 0 (0x00000000) Station flags: len 8 Mask: 0x000000ea Authorized WME Authenticated TDLS-Peer Associated Set: 0x00000000 > Response: Get Station (0x11) len 4 [0x100] 52.225115 Status: Success (0) < RTNL: New Address (0x14) len 24 [request,ack,replace] 55.039375 Flags: 261 (0x105) Sequence number: 1 (0x00000001) Port ID: 0 IFA Family: AF_INET IFA Prefixlen: 16 IFA Index: 3 IFA Scope: global IFA Flags: (0x80) [permanent] Local Address: 169.254.67.142 Broadcast Address: 169.254.255.255 > RTNL: New Address (0x14) len 72 55.039414 Flags: 0 (0x000) Sequence number: 1 (0x00000001) Port ID: 2755997909 IFA Family: AF_INET IFA Prefixlen: 16 IFA Index: 3 IFA Scope: global IFA Flags: (0x80) [permanent] Interface Address: 169.254.67.142 Local Address: 169.254.67.142 Broadcast Address: 169.254.255.255 Label (len:6): wlan0 Flags: (0x80) [permanent] CacheInfo: ifa_prefered: infinite ifa_valid: infinite tstamp: 18655900, cstamp: 18655900 > RTNL: New Address (0x14) len 72 55.039422 Flags: 0 (0x000) Sequence number: 1 (0x00000001) Port ID: 2755997909 IFA Family: AF_INET IFA Prefixlen: 16 IFA Index: 3 IFA Scope: global IFA Flags: (0x80) [permanent] Interface Address: 169.254.67.142 Local Address: 169.254.67.142 Broadcast Address: 169.254.255.255 Label (len:6): wlan0 Flags: (0x80) [permanent] CacheInfo: ifa_prefered: infinite ifa_valid: infinite tstamp: 18655900, cstamp: 18655900 > RTNL: New Address (0x14) len 72 55.039428 Flags: 0 (0x000) Sequence number: 1 (0x00000001) Port ID: 2755997909 IFA Family: AF_INET IFA Prefixlen: 16 IFA Index: 3 IFA Scope: global IFA Flags: (0x80) [permanent] Interface Address: 169.254.67.142 Local Address: 169.254.67.142 Broadcast Address: 169.254.255.255 Label (len:6): wlan0 Flags: (0x80) [permanent] CacheInfo: ifa_prefered: infinite ifa_valid: infinite tstamp: 18655900, cstamp: 18655900 > RTNL: New Address (0x14) len 72 55.039432 Flags: 0 (0x000) Sequence number: 1 (0x00000001) Port ID: 2755997909 IFA Family: AF_INET IFA Prefixlen: 16 IFA Index: 3 IFA Scope: global IFA Flags: (0x80) [permanent] Interface Address: 169.254.67.142 Local Address: 169.254.67.142 Broadcast Address: 169.254.255.255 Label (len:6): wlan0 Flags: (0x80) [permanent] CacheInfo: ifa_prefered: infinite ifa_valid: infinite tstamp: 18655900, cstamp: 18655900 > RTNL: New Address (0x14) len 72 55.039436 Flags: 0 (0x000) Sequence number: 1 (0x00000001) Port ID: 2755997909 IFA Family: AF_INET IFA Prefixlen: 16 IFA Index: 3 IFA Scope: global IFA Flags: (0x80) [permanent] Interface Address: 169.254.67.142 Local Address: 169.254.67.142 Broadcast Address: 169.254.255.255 Label (len:6): wlan0 Flags: (0x80) [permanent] CacheInfo: ifa_prefered: infinite ifa_valid: infinite tstamp: 18655900, cstamp: 18655900 > RTNL: New Route (0x18) len 44 [excl,create] 55.039499 Flags: 1536 (0x600) Sequence number: 0 (0x00000000) Port ID: 0 RTM Family: AF_INET RTM Destination Len: 16 RTM Source Len: 0 RTM TOS Field: 0 RTM Table: 254 RTM Protocol: kernel RTM Scope: link RTM Type: 1 RTM Flags: (0x00) Routing Table: 254 (0x000000fe) Destination Address: 169.254.0.0 Preferred Source: 169.254.67.142 Output Interface Index: 3 > RTNL: Error (0x02) len 20 [0x100] 55.044039 Flags: 256 (0x100) Sequence number: 1 (0x00000001) Port ID: 2755997909 ACK: 0 < RTNL: Get Link (0x12) len 4 [request,dump] 55.044188 Flags: 769 (0x301) Sequence number: 1737596722 (0x67919f32) Port ID: 0 > RTNL: New Link (0x10) len 1412 [multi] 55.044233 Flags: 2 (0x002) Sequence number: 1737596722 (0x67919f32) Port ID: 2965617672 > RTNL: New Link (0x10) len 1464 [multi] 55.044233 Flags: 2 (0x002) Sequence number: 1737596722 (0x67919f32) Port ID: 2965617672 > RTNL: New Link (0x10) len 1460 [multi] 55.044259 Flags: 2 (0x002) Sequence number: 1737596722 (0x67919f32) Port ID: 2965617672 IFLA Family: Unknown IFLA Type: 1 IFLA Index: 3 IFLA ChangeMask: 0 IFLA Flags: (0x1043) [up,broadcast,running,multicast] IfName (len:6): wlan0 Txqlen: 4000 (0x00000fa0) OperState: up (6) LinkMode: userspace controlled (1) MTU: 1500 (0x000005dc) Reserved: len 4 Reserved: len 4 Reserved: len 4 Reserved: len 4 Reserved: len 4 Reserved: len 4 Reserved: len 4 Reserved: len 4 Reserved: len 4 Reserved: len 4 Reserved: len 4 Reserved: len 4 Reserved: len 4 Reserved: len 4 Reserved: len 1 Qdisc (len:11): pfifo_fast Reserved: len 4 Reserved: len 4 Reserved: len 4 Reserved: len 1 Map: len 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Interface Address: dc:a6:32:b4:50:cf Broadcast Address: ff:ff:ff:ff:ff:ff Reserved: len 200 Stats: len 96 f5 01 00 00 18 17 00 00 2b f8 00 00 46 35 29 00 ........+...F5). 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Reserved: len 8 Reserved: len 6 Reserved: len 808 Reserved: len 12 Reserved: len 5 Reserved: len 0 > RTNL: New Link (0x10) len 1408 [multi] 55.044259 Flags: 2 (0x002) Sequence number: 1737596722 (0x67919f32) Port ID: 2965617672 > RTNL: Done (0x03) len 4 [multi] 55.044273 Flags: 2 (0x002) Sequence number: 1737596722 (0x67919f32) Port ID: 2965617672 Status: 0 > RTNL: New Address (0x14) len 72 [multi] 55.044296 Flags: 2 (0x002) Sequence number: 1737596723 (0x67919f33) Port ID: 2965617672 IFA Family: AF_INET IFA Prefixlen: 16 IFA Index: 3 IFA Scope: global IFA Flags: (0x80) [permanent] Interface Address: 169.254.67.142 Local Address: 169.254.67.142 Broadcast Address: 169.254.255.255 Label (len:6): wlan0 Flags: (0x80) [permanent] CacheInfo: ifa_prefered: infinite ifa_valid: infinite tstamp: 18655900, cstamp: 18655900 > RTNL: New Address (0x14) len 64 [multi] 55.044318 Flags: 2 (0x002) Sequence number: 1737596723 (0x67919f33) Port ID: 2965617672 IFA Family: AF_INET6 IFA Prefixlen: 64 IFA Index: 3 IFA Scope: link IFA Flags: (0x80) [permanent] Interface Address: fe80::dea6:32ff:feb4:50cf CacheInfo: ifa_prefered: infinite ifa_valid: infinite tstamp: 18645188, cstamp: 18645188 Flags: (0x80) [permanent] Reserved: len 1 > RTNL: Done (0x03) len 4 [multi] 55.044327 Flags: 2 (0x002) Sequence number: 1737596723 (0x67919f33) Port ID: 2965617672 Status: 0 < RTNL: New Route (0x18) len 36 [request,ack,excl,create] 55.044447 Flags: 1541 (0x605) Sequence number: 1737596723 (0x67919f33) Port ID: 0 RTM Family: AF_INET RTM Destination Len: 0 RTM Source Len: 0 RTM TOS Field: 0 RTM Table: 254 RTM Protocol: boot RTM Scope: global RTM Type: 1 RTM Flags: (0x00) Gateway: 0.0.0.0 Output Interface Index: 3 Priority of the route: -3073 > RTNL: New Route (0x18) len 36 [excl,create] 55.044480 Flags: 1536 (0x600) Sequence number: 1737596723 (0x67919f33) Port ID: 2932237557 RTM Family: AF_INET RTM Destination Len: 0 RTM Source Len: 0 RTM TOS Field: 0 RTM Table: 254 RTM Protocol: boot RTM Scope: global RTM Type: 1 RTM Flags: (0x00) Routing Table: 254 (0x000000fe) Priority of the route: -3073 Output Interface Index: 3 > RTNL: Error (0x02) len 20 [0x100] 55.044486 Flags: 256 (0x100) Sequence number: 1737596723 (0x67919f33) Port ID: 2932237557 ACK: 0 < Request: Get Station (0x11) len 20 [ack] 58.225196 Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C > Result: New Station (0x13) len 92 58.229317 Interface Index: 3 (0x00000003) MAC Address D8:3A:DD:60:A3:0C Generation: 0 (0x00000000) Station Info: len 60 Inactivity time: 48000 (0x0000bb80) Total RX bytes: 0 (0x00000000) Total TX bytes: 0 (0x00000000) RX packets: 0 (0x00000000) TX packets: 0 (0x00000000) TX failed: 0 (0x00000000) Station flags: len 8 Mask: 0x000000ea Authorized WME Authenticated TDLS-Peer Associated Set: 0x00000000 > Response: Get Station (0x11) len 4 [0x100] 58.229327 Status: Success (0)
Jan 22 19:44:36 Pi4 connmand[53107]: Interface wlan0 [ wifi ] state is association Jan 22 19:44:36 Pi4 iwd[2259036]: src/network.c:network_connect() Jan 22 19:44:36 Pi4 iwd[2259036]: src/wiphy.c:wiphy_select_akm() Network is WPA3-Personal... Jan 22 19:44:36 Pi4 iwd[2259036]: event: connect-info, FullMAC driver: brcmfmac using SAE. Expect EXTERNAL_AUTH Jan 22 19:44:36 Pi4 iwd[2259036]: src/network.c:network_connect_psk() ask_passphrase: true Jan 22 19:44:36 Pi4 iwd[2259036]: src/agent.c:agent_request_passphrase() agent 0x5596df5f90 owner :1.1969 path /net/connman/iwd_agent Jan 22 19:44:36 Pi4 iwd[2259036]: src/agent.c:agent_send_next_request() send request to :1.1969 /net/connman/iwd_agent Jan 22 19:44:36 Pi4 iwd[2259036]: src/agent.c:agent_receive_reply() agent 0x5596df5f90 request id 279 Jan 22 19:44:36 Pi4 iwd[2259036]: src/network.c:passphrase_callback() result 0 Jan 22 19:44:36 Pi4 iwd[2259036]: src/wiphy.c:wiphy_select_akm() Network is WPA3-Personal... Jan 22 19:44:36 Pi4 iwd[2259036]: event: connect-info, FullMAC driver: brcmfmac using SAE. Expect EXTERNAL_AUTH Jan 22 19:44:36 Pi4 iwd[2259036]: src/network.c:network_generate_sae_pt() Generating PT for Group 19 Jan 22 19:44:36 Pi4 iwd[2259036]: src/network.c:network_generate_sae_pt() Generating PT for Group 20 Jan 22 19:44:36 Pi4 iwd[2259036]: src/wiphy.c:wiphy_select_akm() Network is WPA3-Personal... Jan 22 19:44:36 Pi4 iwd[2259036]: event: connect-info, FullMAC driver: brcmfmac using SAE. Expect EXTERNAL_AUTH Jan 22 19:44:36 Pi4 iwd[2259036]: src/pmksa.c:pmksa_cache_get() Returning entry with PMKID: dc1225e288927453b9879a01d47d7af5 Jan 22 19:44:36 Pi4 iwd[2259036]: src/netdev.c:netdev_connect_common() Skipping SAE by using PMKSA cache Jan 22 19:44:36 Pi4 iwd[2259036]: src/netdev.c:netdev_cqm_rssi_update() Jan 22 19:44:36 Pi4 iwd[2259036]: src/wiphy.c:wiphy_radio_work_insert() Inserting work item 15 Jan 22 19:44:36 Pi4 iwd[2259036]: src/wiphy.c:wiphy_radio_work_next() Starting work item 15 Jan 22 19:44:36 Pi4 iwd[2259036]: event: connect-info, ssid: deskSAE, bss: d8:3a:dd:60:a3:0c, signal: -59, load: 0/255 Jan 22 19:44:36 Pi4 iwd[2259036]: event: state, old: disconnected, new: connecting Jan 22 19:44:36 Pi4 iwd[2259036]: src/netdev.c:netdev_cmd_set_cqm_cb() CMD_SET_CQM not supported, falling back to polling Jan 22 19:44:36 Pi4 connmand[53107]: Interface wlan0 [ wifi ] state is configuration Jan 22 19:44:36 Pi4 iwd[2259036]: src/netdev.c:netdev_unicast_notify() Unicast notification External Auth(127) Jan 22 19:44:36 Pi4 iwd[2259036]: event: connect-info, External Auth to SSID: deskSAE, bssid: d8:3a:dd:60:a3:0c Jan 22 19:44:36 Pi4 kernel: ieee80211 phy0: brcmf_cfg80211_external_auth: External authentication failed: status=1 Jan 22 19:45:22 Pi4 connmand[53107]: Interface wlan0 [ wifi ] state is ready Jan 22 19:45:22 Pi4 connmand[53107]: wlan0 {add} address 169.254.67.142/16 label wlan0 family 2