Skip to content

Instantly share code, notes, and snippets.

Created April 20, 2016 09:38
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save anonymous/8d14c3945386720985e918f5ce726a69 to your computer and use it in GitHub Desktop.
Save anonymous/8d14c3945386720985e918f5ce726a69 to your computer and use it in GitHub Desktop.
wpa_supplicant v2.5
dbus: Register D-Bus object '/fi/w1/wpa_supplicant1'
Providing DBus service 'fi.w1.wpa_supplicant1'.
Providing DBus service 'fi.epitest.hostap.WPASupplicant'.
Successfully initialized wpa_supplicant
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1) [s]
dbus: fi.w1.wpa_supplicant1.CreateInterface (/fi/w1/wpa_supplicant1) [a{sv}]
wpa_dbus_dict_open_read: start reading a dict entry
wpa_dbus_dict_get_entry: dict entry key: Driver
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
wpa_dbus_dict_get_entry: dict entry key: Ifname
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
Initializing interface 'wlp1s0b1' conf 'N/A' driver 'nl80211,wext' ctrl_interface 'N/A' bridge 'N/A'
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
rfkill: initial event: idx=2 type=1 op=0 soft=0 hard=0
rfkill: initial event: idx=3 type=2 op=0 soft=0 hard=0
rfkill: initial event: idx=10 type=2 op=0 soft=0 hard=0
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:10
nl80211: Supported cipher 00-0f-ac:8
nl80211: Supported cipher 00-0f-ac:9
nl80211: Using driver-based off-channel TX
nl80211: interface wlp1s0b1 in phy phy0
nl80211: Set mode ifindex 2 iftype 2 (STATION)
nl80211: Subscribe to mgmt frames with non-AP handle 0x1681d70
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=040a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=040b
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=040c
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=040d
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=090a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=090b
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=090c
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=090d
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=0409506f9a09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=7f506f9a09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=0801
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=06
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=0a07
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=0a11
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=1101
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=1102
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=0505
netlink: Operstate: ifindex=2 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
nl80211: driver param='(null)'
Add interface wlp1s0b1 to a new radio phy0
nl80211: Regulatory information - country=BY (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 80 MHz 20 mBm
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS)
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS)
nl80211: Added 802.11b mode based on 802.11g information
wlp1s0b1: Own MAC address: 74:2f:68:d2:b1:f3
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
wlp1s0b1: RSN: flushing PMKID list in the driver
nl80211: Flush PMKIDs
wlp1s0b1: State: DISCONNECTED -> INACTIVE
TDLS: TDLS operation not supported by driver
TDLS: Driver uses internal link setup
TDLS: Driver does not support TDLS channel switching
wlp1s0b1: WPS: UUID based on MAC address: e909a86f-b1a7-5277-89e0-0bfd7fd694fd
ENGINE: Loading dynamic engine
ENGINE: Loading dynamic engine
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
dbus: Register interface object '/fi/w1/wpa_supplicant1/Interfaces/1'
wlp1s0b1: Added interface wlp1s0b1
wlp1s0b1: State: INACTIVE -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1) [s]
dbus: fi.w1.wpa_supplicant1.Interface.NetworkReply (/fi/w1/wpa_supplicant1/Interfaces/1) [oss]
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16844d0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16844d0 after 0.000092 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 10 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000061 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.659885 seconds
nl80211: Received scan results (8 BSSes)
wlp1s0b1: BSS: Start scan result update 1
wlp1s0b1: BSS: Add new id 0 BSSID 00:3a:98:f5:8c:f0 SSID 'eduroam' freq 2462
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0'
wlp1s0b1: BSS: Add new id 1 BSSID 00:3a:98:f5:8c:f1 SSID 'test' freq 2462
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1'
wlp1s0b1: BSS: Add new id 2 BSSID 00:3a:99:d2:64:92 SSID 'eduroam' freq 2412
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2'
wlp1s0b1: BSS: Add new id 3 BSSID 28:cf:da:00:f2:f1 SSID 'Point' freq 2462
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3'
wlp1s0b1: BSS: Add new id 4 BSSID 1c:7e:e5:3e:ad:38 SSID 'PMS-WiFi' freq 2412
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4'
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
wlp1s0b1: BSS: Add new id 5 BSSID 00:18:e7:fa:7b:45 SSID '256A' freq 2417
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5'
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
wlp1s0b1: BSS: Add new id 6 BSSID 00:3a:98:f5:8c:f2 SSID 'BSU-Conference' freq 2462
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6'
wlp1s0b1: BSS: Add new id 7 BSSID 00:3a:99:d2:64:90 SSID 'BSU-Conference' freq 2412
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7'
BSS: last_scan_res_used=8/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP 1c:7e:e5:3e:ad:38 type 0 added
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP 00:18:e7:fa:7b:45 type 0 added
WPS: AP[0] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16844d0 done in 0.667003 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: DISCONNECTED -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0) [s]
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1) [s]
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2) [s]
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3) [s]
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4) [s]
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5) [s]
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6) [s]
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7) [s]
EAPOL: disable timer tick
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x1681dc0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x1681dc0 after 0.000160 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000053 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.662028 seconds
nl80211: Received scan results (8 BSSes)
wlp1s0b1: BSS: Start scan result update 2
BSS: last_scan_res_used=8/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x1681dc0 done in 0.663015 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv]
properties_get_or_set: Set(ApScan)
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
wpa_dbus_dict_open_read: start reading a dict entry
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
proactive_key_caching=1 (0x1)
wpa_dbus_dict_get_entry: dict entry key: password
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=6): [REMOVED]
password - hexdump_ascii(len=6): [REMOVED]
wpa_dbus_dict_get_entry: dict entry key: phase1
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase1 - hexdump_ascii(len=9):
70 65 61 70 76 65 72 3d 30 peapver=0
wpa_dbus_dict_get_entry: dict entry key: eap
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
wpa_dbus_dict_get_entry: dict entry key: phase2
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
wpa_dbus_dict_get_entry: dict entry key: ca_path
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: ssid
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=7): [REMOVED]
ssid - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wpa_dbus_dict_get_entry: dict entry key: key_mgmt
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
key_mgmt: 0x1
wpa_dbus_dict_get_entry: dict entry key: identity
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=12): [REMOVED]
identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED
wpa_dbus_dict_get_entry: dict entry key: scan_ssid
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
scan_ssid=1 (0x1)
wpa_dbus_dict_get_entry: dict entry key: fragment_size
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266
fragment_size=1266 (0x4f2)
wpa_dbus_dict_get_entry: dict entry key: ca_path2
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path2 - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: bgscan
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=17): [REMOVED]
bgscan - hexdump_ascii(len=17):
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30
30 0
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
Fast associate: Old scan results
wlp1s0b1: Setting scan request: 0.000000 sec
wlp1s0b1: State: INACTIVE -> SCANNING
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x16a5200
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16a5200 after 0.000019 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000074 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.661622 seconds
nl80211: Received scan results (8 BSSes)
wlp1s0b1: BSS: Start scan result update 3
BSS: last_scan_res_used=8/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16a5200 done in 0.662642 seconds
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-41 freq=2462
wlp1s0b1: selected based on RSN IE
wlp1s0b1: selected BSS 00:3a:98:f5:8c:f0 ssid='eduroam'
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:98:f5:8c:f0 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16abec0 current_ssid=0x16abec0
wlp1s0b1: Request association with 00:3a:98:f5:8c:f0
wlp1s0b1: Add radio work 'sme-connect'@0x16a50b0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'sme-connect'@0x16a50b0 after 0.000028 second wait
wlp1s0b1: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=0x16abec0 try_opportunistic=1
RSN: Search for BSSID 00:3a:98:f5:8c:f0
RSN: Consider 00:3a:98:f5:8c:f0 for OKC
RSN: No PMKSA cache entry found
wlp1s0b1: RSN: using IEEE 802.11i/D9.0
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2
wlp1s0b1: WPA: Selected mgmt group cipher 32
wlp1s0b1: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00
wlp1s0b1: WPA: using GTK TKIP
wlp1s0b1: WPA: using PTK CCMP
wlp1s0b1: WPA: using KEY_MGMT 802.1X
wlp1s0b1: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp1s0b1: Cancelling scan request
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:8c:f0 (SSID='eduroam' freq=2462 MHz)
wlp1s0b1: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlp1s0b1: Determining shared radio frequencies (max len 1)
wlp1s0b1: Shared frequencies (len=0): completed iteration
nl80211: Authenticate (ifindex=2)
* bssid=00:3a:98:f5:8c:f0
* freq=2462
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1
nl80211: New station 00:3a:98:f5:8c:f0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:8c:f0
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 3a 98 f5 8c f0 c0 67 00 00 02 00 00 00
nl80211: Authenticate event
wlp1s0b1: Event AUTH (11) received
wlp1s0b1: SME: Authentication response: peer=00:3a:98:f5:8c:f0 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp1s0b1: set_disable_max_amsdu: -1
wlp1s0b1: set_ampdu_factor: -1
wlp1s0b1: set_ampdu_density: -1
wlp1s0b1: set_disable_ht40: 0
wlp1s0b1: set_disable_sgi: 0
wlp1s0b1: set_disable_ldpc: 0
wlp1s0b1: Trying to associate with 00:3a:98:f5:8c:f0 (SSID='eduroam' freq=2462 MHz)
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
nl80211: Associate (ifindex=2)
* bssid=00:3a:98:f5:8c:f0
* freq=2462
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac02
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:8c:f0
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 3a 98 f5 8c f0 d0 67 31 04 00 00 02 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
nl80211: Associate event
wlp1s0b1: Event ASSOC (0) received
wlp1s0b1: Association info event
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
wlp1s0b1: freq=2462 MHz
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:98:f5:8c:f0
wlp1s0b1: Associated with 00:3a:98:f5:8c:f0
wlp1s0b1: WPA: Association event - clear replay counter
wlp1s0b1: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec
wlp1s0b1: Cancelling scan request
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
nl80211: Event message available
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1
nl80211: Ignore connect event (cmd=46) when using userspace SME
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=50
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c 70 6f 72 74 69 64 3d 32 39
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=41):
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c am,nasid=WiFi-B,
70 6f 72 74 69 64 3d 32 39 portid=29
EAP: using real identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:8c:f0
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41
EAPOL: SUPP_BE entering state RECEIVE
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=3
* type=0
* alpha2=RU
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=RU (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 40 MHz 20 mBm
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS)
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS)
nl80211: 5735-5835 @ 40 MHz 30 mBm
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=10
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Status notification: accept proposed method (param=PEAP)
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
EAP-PEAP: Forced PEAP version 0
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
TLS: Trusted root certificate(s) loaded
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=0)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
OpenSSL: TX ver=0x303 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x303 content_type=22
OpenSSL: Message - hexdump(len=298): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv2/v3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv2/v3 read server hello A
SSL: SSL_connect - want more data
SSL: 303 bytes pending from ssl_out
SSL: 303 bytes left to be sent out (of total 303 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x16ada90
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:8c:f0
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 13 fe f0 f9 19 c7 39 67 05 a0 c8 d3 cf d1 54 de e1 d8 fe ce 97 d4 4b 8f ad 08 15 e5 14 8f dc 97 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=8
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: Status notification: completion (param=failure)
EAP: EAP entering state FAILURE
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:3a:98:f5:8c:f0
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed - result=FAILURE
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec
EAPOL: startWhen --> 0
wlp1s0b1: Authentication with 00:3a:98:f5:8c:f0 timed out.
Added BSSID 00:3a:98:f5:8c:f0 into blacklist
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Request to deauthenticate - bssid=00:3a:98:f5:8c:f0 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED
TDLS: Tear down peers
wpa_driver_nl80211_deauthenticate(addr=00:3a:98:f5:8c:f0 reason_code=3)
wlp1s0b1: Event DEAUTH (12) received
wlp1s0b1: Deauthentication notification
wlp1s0b1: * reason 3 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:98:f5:8c:f0 reason=3 locally_generated=1
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6)
wlp1s0b1: Setting scan request: 0.100000 sec
wlp1s0b1: Radio work 'sme-connect'@0x16a50b0 done in 2.097770 seconds
BSSID 00:3a:98:f5:8c:f0 blacklist count incremented to 2
wlp1s0b1: Blacklist count 2 --> request scan in 500 ms
wlp1s0b1: Ignore new scan request for 0.500000 sec since an earlier request is scheduled to trigger sooner
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Disconnect event - remove keys
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1
nl80211: Delete station 00:3a:98:f5:8c:f0
nl80211: Event message available
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:98:f5:8c:f0 A2=74:2f:68:d2:b1:f3
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 98 f5 8c f0 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 00 03 00
nl80211: Deauthenticate event
nl80211: Ignore deauth event triggered due to own deauth request
nl80211: Event message available
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1
nl80211: Ignore disconnect event when using userspace SME
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=0
* type=1
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=1
* type=0
* alpha2=BY
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=BY (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 80 MHz 20 mBm
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS)
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS)
nl80211: Added 802.11b mode based on 802.11g information
wlp1s0b1: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x16a4ff0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16a4ff0 after 0.000028 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000068 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.660210 seconds
nl80211: Received scan results (8 BSSes)
wlp1s0b1: BSS: Start scan result update 4
BSS: last_scan_res_used=8/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP 00:18:e7:fa:7b:45 type 0 added
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP 1c:7e:e5:3e:ad:38 type 0 added
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16a4ff0 done in 0.661437 seconds
wlp1s0b1: Postpone network selection by 9 seconds since all networks are disabled
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
EAPOL: disable timer tick
wlp1s0b1: Try to associate due to network getting re-enabled
Fast associate: Old scan results
wlp1s0b1: Setting scan request: 0.000000 sec
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x16a4ff0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16a4ff0 after 0.000017 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000058 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.668080 seconds
nl80211: Received scan results (8 BSSes)
wlp1s0b1: BSS: Start scan result update 5
BSS: last_scan_res_used=8/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16a4ff0 done in 0.669191 seconds
wlp1s0b1: CTRL-EVENT-SSID-REENABLED id=0 ssid="eduroam"
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:98:f5:8c:f1 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-42 freq=2462
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 1: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-42 freq=2462
wlp1s0b1: skip - blacklisted (count=2 limit=0)
wlp1s0b1: 2: 00:3a:99:d2:64:92 ssid='eduroam' wpa_ie_len=32 rsn_ie_len=28 caps=0x431 level=-74 freq=2412
wlp1s0b1: selected based on RSN IE
wlp1s0b1: selected BSS 00:3a:99:d2:64:92 ssid='eduroam'
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:99:d2:64:92 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16abec0 current_ssid=(nil)
wlp1s0b1: Request association with 00:3a:99:d2:64:92
wlp1s0b1: Re-association to the same ESS
wlp1s0b1: Add radio work 'sme-connect'@0x16a4ff0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'sme-connect'@0x16a4ff0 after 0.000027 second wait
wlp1s0b1: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=1
RSN: Search for BSSID 00:3a:99:d2:64:92
RSN: Consider 00:3a:99:d2:64:92 for OKC
RSN: No PMKSA cache entry found
wlp1s0b1: RSN: using IEEE 802.11i/D9.0
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2
wlp1s0b1: WPA: Selected mgmt group cipher 32
WPA: set AP WPA IE - hexdump(len=34): dd 20 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 02 00 00 50 f2 01 00 40 96 00 00 00
WPA: set AP RSN IE - hexdump(len=30): 30 1c 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 02 00 00 0f ac 01 00 40 96 00 28 00
wlp1s0b1: WPA: using GTK TKIP
wlp1s0b1: WPA: using PTK CCMP
wlp1s0b1: WPA: using KEY_MGMT 802.1X
wlp1s0b1: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp1s0b1: Cancelling scan request
wlp1s0b1: SME: Trying to authenticate with 00:3a:99:d2:64:92 (SSID='eduroam' freq=2412 MHz)
wlp1s0b1: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlp1s0b1: Determining shared radio frequencies (max len 1)
wlp1s0b1: Shared frequencies (len=0): completed iteration
nl80211: Authenticate (ifindex=2)
* bssid=00:3a:99:d2:64:92
* freq=2412
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1
nl80211: New station 00:3a:99:d2:64:92
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:d2:64:92
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 3a 99 d2 64 92 40 a2 00 00 02 00 00 00
nl80211: Authenticate event
wlp1s0b1: Event AUTH (11) received
wlp1s0b1: SME: Authentication response: peer=00:3a:99:d2:64:92 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp1s0b1: set_disable_max_amsdu: -1
wlp1s0b1: set_ampdu_factor: -1
wlp1s0b1: set_ampdu_density: -1
wlp1s0b1: set_disable_ht40: 0
wlp1s0b1: set_disable_sgi: 0
wlp1s0b1: set_disable_ldpc: 0
wlp1s0b1: Trying to associate with 00:3a:99:d2:64:92 (SSID='eduroam' freq=2412 MHz)
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
nl80211: Associate (ifindex=2)
* bssid=00:3a:99:d2:64:92
* freq=2412
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac02
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:d2:64:92
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 3a 99 d2 64 92 60 a2 31 04 00 00 04 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
nl80211: Associate event
wlp1s0b1: Event ASSOC (0) received
wlp1s0b1: Association info event
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
wlp1s0b1: freq=2412 MHz
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:99:d2:64:92
wlp1s0b1: Associated with 00:3a:99:d2:64:92
wlp1s0b1: WPA: Association event - clear replay counter
wlp1s0b1: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE
ENGINE: engine deinit
EAP: EAP entering state IDLE
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec
wlp1s0b1: Cancelling scan request
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1
nl80211: Ignore connect event (cmd=46) when using userspace SME
l2_packet_receive: src=00:3a:99:d2:64:92 len=50
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c 70 6f 72 74 69 64 3d 32 39
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=41):
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c am,nasid=WiFi-A,
70 6f 72 74 69 64 3d 32 39 portid=29
EAP: using real identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:99:d2:64:92
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41
EAPOL: SUPP_BE entering state RECEIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
l2_packet_receive: src=00:3a:99:d2:64:92 len=10
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Status notification: accept proposed method (param=PEAP)
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
EAP-PEAP: Forced PEAP version 0
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
TLS: Trusted root certificate(s) loaded
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=0)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
OpenSSL: TX ver=0x303 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x303 content_type=22
OpenSSL: Message - hexdump(len=298): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv2/v3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv2/v3 read server hello A
SSL: SSL_connect - want more data
SSL: 303 bytes pending from ssl_out
SSL: 303 bytes left to be sent out (of total 303 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x16ad5f0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:99:d2:64:92
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 d4 4e 11 c0 20 6f e8 51 8e a4 18 21 5d 01 74 fd dc 6e cf 0a 38 1d 86 b9 2d ad cd 11 66 bd 9c 0a 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01
EAPOL: SUPP_BE entering state RECEIVE
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=3
* type=0
* alpha2=RU
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=RU (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 40 MHz 20 mBm
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS)
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS)
nl80211: 5735-5835 @ 40 MHz 30 mBm
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
l2_packet_receive: src=00:3a:99:d2:64:92 len=8
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: Status notification: completion (param=failure)
EAP: EAP entering state FAILURE
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:3a:99:d2:64:92
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed - result=FAILURE
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec
EAPOL: startWhen --> 0
wlp1s0b1: Authentication with 00:3a:99:d2:64:92 timed out.
Added BSSID 00:3a:99:d2:64:92 into blacklist
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Request to deauthenticate - bssid=00:3a:99:d2:64:92 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED
TDLS: Tear down peers
wpa_driver_nl80211_deauthenticate(addr=00:3a:99:d2:64:92 reason_code=3)
wlp1s0b1: Event DEAUTH (12) received
wlp1s0b1: Deauthentication notification
wlp1s0b1: * reason 3 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:99:d2:64:92 reason=3 locally_generated=1
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=2 duration=23 reason=AUTH_FAILED
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6)
wlp1s0b1: Setting scan request: 0.100000 sec
wlp1s0b1: Radio work 'sme-connect'@0x16a4ff0 done in 2.036831 seconds
BSSID 00:3a:99:d2:64:92 blacklist count incremented to 2
wlp1s0b1: Blacklist count 2 --> request scan in 500 ms
wlp1s0b1: Ignore new scan request for 0.500000 sec since an earlier request is scheduled to trigger sooner
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Disconnect event - remove keys
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1
nl80211: Delete station 00:3a:99:d2:64:92
nl80211: Event message available
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:99:d2:64:92 A2=74:2f:68:d2:b1:f3
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 99 d2 64 92 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 00 03 00
nl80211: Deauthenticate event
nl80211: Ignore deauth event triggered due to own deauth request
nl80211: Event message available
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1
nl80211: Ignore disconnect event when using userspace SME
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=0
* type=1
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=1
* type=0
* alpha2=BY
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=BY (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 80 MHz 20 mBm
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS)
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS)
nl80211: Added 802.11b mode based on 802.11g information
wlp1s0b1: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x16af100
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16af100 after 0.000021 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000060 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.659816 seconds
nl80211: Received scan results (8 BSSes)
wlp1s0b1: BSS: Start scan result update 6
BSS: last_scan_res_used=8/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP 00:18:e7:fa:7b:45 type 0 added
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP 1c:7e:e5:3e:ad:38 type 0 added
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16af100 done in 0.660836 seconds
wlp1s0b1: Postpone network selection by 23 seconds since all networks are disabled
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
EAPOL: disable timer tick
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv]
properties_get_or_set: Set(ApScan)
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
wpa_dbus_dict_open_read: start reading a dict entry
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
proactive_key_caching=1 (0x1)
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate
ENGINE: engine deinit
wpa_dbus_dict_get_entry: dict entry key: password
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=6): [REMOVED]
password - hexdump_ascii(len=6): [REMOVED]
wpa_dbus_dict_get_entry: dict entry key: phase1
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase1 - hexdump_ascii(len=9):
70 65 61 70 76 65 72 3d 30 peapver=0
wpa_dbus_dict_get_entry: dict entry key: eap
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
wpa_dbus_dict_get_entry: dict entry key: phase2
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
wpa_dbus_dict_get_entry: dict entry key: ca_path
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: ssid
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=7): [REMOVED]
ssid - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wpa_dbus_dict_get_entry: dict entry key: key_mgmt
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
key_mgmt: 0x1
wpa_dbus_dict_get_entry: dict entry key: identity
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=12): [REMOVED]
identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED
wpa_dbus_dict_get_entry: dict entry key: scan_ssid
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
scan_ssid=1 (0x1)
wpa_dbus_dict_get_entry: dict entry key: fragment_size
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266
fragment_size=1266 (0x4f2)
wpa_dbus_dict_get_entry: dict entry key: ca_path2
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path2 - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: bgscan
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=17): [REMOVED]
bgscan - hexdump_ascii(len=17):
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30
30 0
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
Fast associate: Old scan results
wlp1s0b1: Setting scan request: 0.000000 sec
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x168b0a0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x168b0a0 after 0.000016 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000059 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.666016 seconds
nl80211: Received scan results (9 BSSes)
wlp1s0b1: BSS: Start scan result update 7
wlp1s0b1: BSS: Add new id 8 BSSID 50:17:ff:dc:2b:41 SSID 'VELCOM WIFI' freq 2412
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/8'
BSS: last_scan_res_used=9/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x168b0a0 done in 0.667315 seconds
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-41 freq=2462
wlp1s0b1: skip - blacklisted (count=2 limit=0)
wlp1s0b1: 1: 00:3a:98:f5:8c:f1 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-54 freq=2462
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 2: 00:3a:99:d2:64:92 ssid='eduroam' wpa_ie_len=32 rsn_ie_len=28 caps=0x431 level=-72 freq=2412
wlp1s0b1: skip - blacklisted (count=2 limit=0)
wlp1s0b1: 3: 00:18:e7:fa:7b:45 ssid='256A' wpa_ie_len=26 rsn_ie_len=24 caps=0x431 level=-77 freq=2417 wps
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 4: 28:cf:da:00:f2:f1 ssid='Point' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-78 freq=2462
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 5: 50:17:ff:dc:2b:41 ssid='VELCOM WIFI' wpa_ie_len=0 rsn_ie_len=20 caps=0x1431 level=-83 freq=2412
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 6: 1c:7e:e5:3e:ad:38 ssid='PMS-WiFi' wpa_ie_len=26 rsn_ie_len=24 caps=0x431 level=-84 freq=2412 wps
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 7: 00:3a:98:f5:8c:f2 ssid='BSU-Conference' wpa_ie_len=0 rsn_ie_len=0 caps=0x431 level=-54 freq=2462
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 8: 00:3a:99:d2:64:90 ssid='BSU-Conference' wpa_ie_len=0 rsn_ie_len=0 caps=0x431 level=-72 freq=2412
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: No APs found - clear blacklist and try again
Removed BSSID 00:3a:99:d2:64:92 from blacklist (clear)
Removed BSSID 00:3a:98:f5:8c:f0 from blacklist (clear)
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-41 freq=2462
wlp1s0b1: selected based on RSN IE
wlp1s0b1: selected BSS 00:3a:98:f5:8c:f0 ssid='eduroam'
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:98:f5:8c:f0 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16ad5f0 current_ssid=0x16ad5f0
wlp1s0b1: Request association with 00:3a:98:f5:8c:f0
wlp1s0b1: Add radio work 'sme-connect'@0x168b0a0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'sme-connect'@0x168b0a0 after 0.000030 second wait
wlp1s0b1: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=0x16ad5f0 try_opportunistic=1
RSN: Search for BSSID 00:3a:98:f5:8c:f0
RSN: Consider 00:3a:98:f5:8c:f0 for OKC
RSN: No PMKSA cache entry found
wlp1s0b1: RSN: using IEEE 802.11i/D9.0
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2
wlp1s0b1: WPA: Selected mgmt group cipher 32
wlp1s0b1: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00
wlp1s0b1: WPA: using GTK TKIP
wlp1s0b1: WPA: using PTK CCMP
wlp1s0b1: WPA: using KEY_MGMT 802.1X
wlp1s0b1: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp1s0b1: Cancelling scan request
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:8c:f0 (SSID='eduroam' freq=2462 MHz)
wlp1s0b1: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlp1s0b1: Determining shared radio frequencies (max len 1)
wlp1s0b1: Shared frequencies (len=0): completed iteration
nl80211: Authenticate (ifindex=2)
* bssid=00:3a:98:f5:8c:f0
* freq=2462
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1
nl80211: New station 00:3a:98:f5:8c:f0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:8c:f0
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 3a 98 f5 8c f0 80 a5 00 00 02 00 00 00
nl80211: Authenticate event
wlp1s0b1: Event AUTH (11) received
wlp1s0b1: SME: Authentication response: peer=00:3a:98:f5:8c:f0 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp1s0b1: set_disable_max_amsdu: -1
wlp1s0b1: set_ampdu_factor: -1
wlp1s0b1: set_ampdu_density: -1
wlp1s0b1: set_disable_ht40: 0
wlp1s0b1: set_disable_sgi: 0
wlp1s0b1: set_disable_ldpc: 0
wlp1s0b1: Trying to associate with 00:3a:98:f5:8c:f0 (SSID='eduroam' freq=2462 MHz)
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
nl80211: Associate (ifindex=2)
* bssid=00:3a:98:f5:8c:f0
* freq=2462
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac02
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:8c:f0
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 3a 98 f5 8c f0 a0 a5 31 04 00 00 02 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
nl80211: Associate event
wlp1s0b1: Event ASSOC (0) received
wlp1s0b1: Association info event
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
wlp1s0b1: freq=2462 MHz
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:98:f5:8c:f0
wlp1s0b1: Associated with 00:3a:98:f5:8c:f0
wlp1s0b1: WPA: Association event - clear replay counter
wlp1s0b1: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec
wlp1s0b1: Cancelling scan request
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=50
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c 70 6f 72 74 69 64 3d 32 39
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=41):
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c am,nasid=WiFi-B,
70 6f 72 74 69 64 3d 32 39 portid=29
EAP: using real identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:8c:f0
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41
EAPOL: SUPP_BE entering state RECEIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
nl80211: Event message available
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1
nl80211: Ignore connect event (cmd=46) when using userspace SME
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=3
* type=0
* alpha2=RU
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=RU (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 40 MHz 20 mBm
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS)
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS)
nl80211: 5735-5835 @ 40 MHz 30 mBm
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=10
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Status notification: accept proposed method (param=PEAP)
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
EAP-PEAP: Forced PEAP version 0
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
TLS: Trusted root certificate(s) loaded
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=0)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
OpenSSL: TX ver=0x303 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x303 content_type=22
OpenSSL: Message - hexdump(len=298): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv2/v3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv2/v3 read server hello A
SSL: SSL_connect - want more data
SSL: 303 bytes pending from ssl_out
SSL: 303 bytes left to be sent out (of total 303 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x16ae8c0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:8c:f0
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 d4 f8 36 4a ac 97 68 1c 89 26 f2 f5 0a 12 5e 12 d0 32 d6 8e e8 51 2f 10 c1 fe a7 b7 2a e3 7a 24 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01
EAPOL: SUPP_BE entering state RECEIVE
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/8) [s]
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=8
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: Status notification: completion (param=failure)
EAP: EAP entering state FAILURE
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:3a:98:f5:8c:f0
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed - result=FAILURE
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec
EAPOL: startWhen --> 0
wlp1s0b1: Authentication with 00:3a:98:f5:8c:f0 timed out.
Added BSSID 00:3a:98:f5:8c:f0 into blacklist
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Request to deauthenticate - bssid=00:3a:98:f5:8c:f0 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED
TDLS: Tear down peers
wpa_driver_nl80211_deauthenticate(addr=00:3a:98:f5:8c:f0 reason_code=3)
wlp1s0b1: Event DEAUTH (12) received
wlp1s0b1: Deauthentication notification
wlp1s0b1: * reason 3 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:98:f5:8c:f0 reason=3 locally_generated=1
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6)
wlp1s0b1: Setting scan request: 0.100000 sec
wlp1s0b1: Radio work 'sme-connect'@0x168b0a0 done in 2.065179 seconds
BSSID 00:3a:98:f5:8c:f0 blacklist count incremented to 2
Continuous association failures - consider temporary network disabling
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=2 duration=26 reason=CONN_FAILED
wlp1s0b1: Blacklist count 4 --> request scan in 5000 ms
wlp1s0b1: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Disconnect event - remove keys
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1
nl80211: Delete station 00:3a:98:f5:8c:f0
nl80211: Event message available
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:98:f5:8c:f0 A2=74:2f:68:d2:b1:f3
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 98 f5 8c f0 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 00 03 00
nl80211: Deauthenticate event
nl80211: Ignore deauth event triggered due to own deauth request
nl80211: Event message available
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1
nl80211: Ignore disconnect event when using userspace SME
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=0
* type=1
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=1
* type=0
* alpha2=BY
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=BY (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 80 MHz 20 mBm
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS)
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS)
nl80211: Added 802.11b mode based on 802.11g information
wlp1s0b1: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x16a5160
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16a5160 after 0.000022 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000058 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.659835 seconds
nl80211: Received scan results (10 BSSes)
wlp1s0b1: BSS: Start scan result update 8
wlp1s0b1: BSS: Add new id 9 BSSID 50:17:ff:dc:2b:40 SSID 'BELTELECOM' freq 2412
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9'
BSS: last_scan_res_used=10/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP 00:18:e7:fa:7b:45 type 0 added
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP 1c:7e:e5:3e:ad:38 type 0 added
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16a5160 done in 0.661144 seconds
wlp1s0b1: Postpone network selection by 26 seconds since all networks are disabled
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/8
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9) [s]
EAPOL: disable timer tick
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
wlp1s0b1: Try to associate due to network getting re-enabled
Fast associate: Old scan results
wlp1s0b1: Setting scan request: 0.000000 sec
wlp1s0b1: No enabled networks - do not scan
wlp1s0b1: State: SCANNING -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16844d0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16844d0 after 0.000134 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000058 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.664486 seconds
nl80211: Received scan results (10 BSSes)
wlp1s0b1: BSS: Start scan result update 9
BSS: last_scan_res_used=10/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16844d0 done in 0.665492 seconds
wlp1s0b1: No APs found - clear blacklist and try again
Removed BSSID 00:3a:98:f5:8c:f0 from blacklist (clear)
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/8
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16844d0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16844d0 after 0.000173 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000062 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.661660 seconds
nl80211: Received scan results (9 BSSes)
wlp1s0b1: BSS: Start scan result update 10
BSS: last_scan_res_used=9/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16844d0 done in 0.662703 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16844d0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16844d0 after 0.000181 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000059 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.658863 seconds
nl80211: Received scan results (9 BSSes)
wlp1s0b1: BSS: Start scan result update 11
wlp1s0b1: BSS: Remove id 8 BSSID 50:17:ff:dc:2b:41 SSID 'VELCOM WIFI' due to no match in scan
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/8'
BSS: last_scan_res_used=9/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16844d0 done in 0.659923 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16844d0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16844d0 after 0.000159 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000061 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.664658 seconds
nl80211: Received scan results (9 BSSes)
wlp1s0b1: BSS: Start scan result update 12
wlp1s0b1: BSS: Add new id 10 BSSID 00:3a:9a:00:7c:42 SSID 'eduroam' freq 2412
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/10'
BSS: last_scan_res_used=9/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16844d0 done in 0.665969 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/10) [s]
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16844d0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16844d0 after 0.000162 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000072 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.664184 seconds
nl80211: Received scan results (9 BSSes)
wlp1s0b1: BSS: Start scan result update 13
BSS: last_scan_res_used=9/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16844d0 done in 0.665282 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv]
properties_get_or_set: Set(ApScan)
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
wpa_dbus_dict_open_read: start reading a dict entry
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
proactive_key_caching=1 (0x1)
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate
ENGINE: engine deinit
wpa_dbus_dict_get_entry: dict entry key: password
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=6): [REMOVED]
password - hexdump_ascii(len=6): [REMOVED]
wpa_dbus_dict_get_entry: dict entry key: phase1
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase1 - hexdump_ascii(len=9):
70 65 61 70 76 65 72 3d 30 peapver=0
wpa_dbus_dict_get_entry: dict entry key: eap
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
wpa_dbus_dict_get_entry: dict entry key: phase2
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
wpa_dbus_dict_get_entry: dict entry key: ca_path
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: ssid
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=7): [REMOVED]
ssid - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wpa_dbus_dict_get_entry: dict entry key: key_mgmt
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
key_mgmt: 0x1
wpa_dbus_dict_get_entry: dict entry key: identity
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=12): [REMOVED]
identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED
wpa_dbus_dict_get_entry: dict entry key: scan_ssid
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
scan_ssid=1 (0x1)
wpa_dbus_dict_get_entry: dict entry key: fragment_size
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266
fragment_size=1266 (0x4f2)
wpa_dbus_dict_get_entry: dict entry key: ca_path2
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path2 - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: bgscan
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=17): [REMOVED]
bgscan - hexdump_ascii(len=17):
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30
30 0
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
Fast associate: Old scan results
wlp1s0b1: Setting scan request: 0.000000 sec
wlp1s0b1: State: INACTIVE -> SCANNING
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x16aed80
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16aed80 after 0.000020 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000060 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.662824 seconds
nl80211: Received scan results (10 BSSes)
wlp1s0b1: BSS: Start scan result update 14
BSS: last_scan_res_used=10/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16aed80 done in 0.663872 seconds
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:98:f5:8c:f1 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-38 freq=2462
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 1: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-40 freq=2462
wlp1s0b1: selected based on RSN IE
wlp1s0b1: selected BSS 00:3a:98:f5:8c:f0 ssid='eduroam'
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:98:f5:8c:f0 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16a6530 current_ssid=0x16a6530
wlp1s0b1: Request association with 00:3a:98:f5:8c:f0
wlp1s0b1: Add radio work 'sme-connect'@0x16aed80
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'sme-connect'@0x16aed80 after 0.000030 second wait
wlp1s0b1: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=0x16a6530 try_opportunistic=1
RSN: Search for BSSID 00:3a:98:f5:8c:f0
RSN: Consider 00:3a:98:f5:8c:f0 for OKC
RSN: No PMKSA cache entry found
wlp1s0b1: RSN: using IEEE 802.11i/D9.0
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2
wlp1s0b1: WPA: Selected mgmt group cipher 32
wlp1s0b1: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00
wlp1s0b1: WPA: using GTK TKIP
wlp1s0b1: WPA: using PTK CCMP
wlp1s0b1: WPA: using KEY_MGMT 802.1X
wlp1s0b1: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp1s0b1: Cancelling scan request
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:8c:f0 (SSID='eduroam' freq=2462 MHz)
wlp1s0b1: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlp1s0b1: Determining shared radio frequencies (max len 1)
wlp1s0b1: Shared frequencies (len=0): completed iteration
nl80211: Authenticate (ifindex=2)
* bssid=00:3a:98:f5:8c:f0
* freq=2462
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1
nl80211: New station 00:3a:98:f5:8c:f0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:8c:f0
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 3a 98 f5 8c f0 30 d4 00 00 02 00 00 00
nl80211: Authenticate event
wlp1s0b1: Event AUTH (11) received
wlp1s0b1: SME: Authentication response: peer=00:3a:98:f5:8c:f0 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp1s0b1: set_disable_max_amsdu: -1
wlp1s0b1: set_ampdu_factor: -1
wlp1s0b1: set_ampdu_density: -1
wlp1s0b1: set_disable_ht40: 0
wlp1s0b1: set_disable_sgi: 0
wlp1s0b1: set_disable_ldpc: 0
wlp1s0b1: Trying to associate with 00:3a:98:f5:8c:f0 (SSID='eduroam' freq=2462 MHz)
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
nl80211: Associate (ifindex=2)
* bssid=00:3a:98:f5:8c:f0
* freq=2462
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac02
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/10
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:8c:f0
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 3a 98 f5 8c f0 40 d4 31 04 00 00 02 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
nl80211: Associate event
wlp1s0b1: Event ASSOC (0) received
wlp1s0b1: Association info event
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
wlp1s0b1: freq=2462 MHz
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:98:f5:8c:f0
wlp1s0b1: Associated with 00:3a:98:f5:8c:f0
wlp1s0b1: WPA: Association event - clear replay counter
wlp1s0b1: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec
wlp1s0b1: Cancelling scan request
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
nl80211: Event message available
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1
nl80211: Ignore connect event (cmd=46) when using userspace SME
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=50
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c 70 6f 72 74 69 64 3d 32 39
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=41):
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c am,nasid=WiFi-B,
70 6f 72 74 69 64 3d 32 39 portid=29
EAP: using real identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:8c:f0
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41
EAPOL: SUPP_BE entering state RECEIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=3
* type=0
* alpha2=RU
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=RU (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 40 MHz 20 mBm
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS)
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS)
nl80211: 5735-5835 @ 40 MHz 30 mBm
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=10
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Status notification: accept proposed method (param=PEAP)
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
EAP-PEAP: Forced PEAP version 0
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
TLS: Trusted root certificate(s) loaded
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=0)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
OpenSSL: TX ver=0x303 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x303 content_type=22
OpenSSL: Message - hexdump(len=298): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv2/v3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv2/v3 read server hello A
SSL: SSL_connect - want more data
SSL: 303 bytes pending from ssl_out
SSL: 303 bytes left to be sent out (of total 303 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x16abf90
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:8c:f0
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 32 8c 2d 3e d1 fb fa 1a be d4 8a d6 d2 72 c1 6a 5c b5 a8 fd 21 c6 44 89 98 3e 90 b1 3a cb ff e1 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=8
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: Status notification: completion (param=failure)
EAP: EAP entering state FAILURE
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:3a:98:f5:8c:f0
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed - result=FAILURE
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec
EAPOL: startWhen --> 0
wlp1s0b1: Authentication with 00:3a:98:f5:8c:f0 timed out.
Added BSSID 00:3a:98:f5:8c:f0 into blacklist
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Request to deauthenticate - bssid=00:3a:98:f5:8c:f0 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED
TDLS: Tear down peers
wpa_driver_nl80211_deauthenticate(addr=00:3a:98:f5:8c:f0 reason_code=3)
wlp1s0b1: Event DEAUTH (12) received
wlp1s0b1: Deauthentication notification
wlp1s0b1: * reason 3 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:98:f5:8c:f0 reason=3 locally_generated=1
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6)
wlp1s0b1: Setting scan request: 0.100000 sec
wlp1s0b1: Radio work 'sme-connect'@0x16aed80 done in 2.042314 seconds
BSSID 00:3a:98:f5:8c:f0 blacklist count incremented to 2
Continuous association failures - consider temporary network disabling
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=2 duration=37 reason=CONN_FAILED
wlp1s0b1: Blacklist count 6 --> request scan in 10000 ms
wlp1s0b1: Ignore new scan request for 10.000000 sec since an earlier request is scheduled to trigger sooner
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Disconnect event - remove keys
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1
nl80211: Delete station 00:3a:98:f5:8c:f0
nl80211: Event message available
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:98:f5:8c:f0 A2=74:2f:68:d2:b1:f3
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 98 f5 8c f0 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 00 03 00
nl80211: Deauthenticate event
nl80211: Ignore deauth event triggered due to own deauth request
nl80211: Event message available
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1
nl80211: Ignore disconnect event when using userspace SME
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=0
* type=1
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=1
* type=0
* alpha2=BY
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=BY (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 80 MHz 20 mBm
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS)
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS)
nl80211: Added 802.11b mode based on 802.11g information
wlp1s0b1: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x168af10
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x168af10 after 0.000021 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000059 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.658938 seconds
nl80211: Received scan results (10 BSSes)
wlp1s0b1: BSS: Start scan result update 15
BSS: last_scan_res_used=10/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP 00:18:e7:fa:7b:45 type 0 added
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP 1c:7e:e5:3e:ad:38 type 0 added
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x168af10 done in 0.660017 seconds
wlp1s0b1: Postpone network selection by 36 seconds since all networks are disabled
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/10
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9
EAPOL: disable timer tick
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv]
properties_get_or_set: Set(ApScan)
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
wpa_dbus_dict_open_read: start reading a dict entry
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
proactive_key_caching=1 (0x1)
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate
ENGINE: engine deinit
wpa_dbus_dict_get_entry: dict entry key: password
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=6): [REMOVED]
password - hexdump_ascii(len=6): [REMOVED]
wpa_dbus_dict_get_entry: dict entry key: phase1
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase1 - hexdump_ascii(len=9):
70 65 61 70 76 65 72 3d 30 peapver=0
wpa_dbus_dict_get_entry: dict entry key: eap
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
wpa_dbus_dict_get_entry: dict entry key: phase2
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
wpa_dbus_dict_get_entry: dict entry key: ca_path
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: ssid
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=7): [REMOVED]
ssid - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wpa_dbus_dict_get_entry: dict entry key: key_mgmt
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
key_mgmt: 0x1
wpa_dbus_dict_get_entry: dict entry key: identity
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=12): [REMOVED]
identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED
wpa_dbus_dict_get_entry: dict entry key: scan_ssid
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
scan_ssid=1 (0x1)
wpa_dbus_dict_get_entry: dict entry key: fragment_size
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266
fragment_size=1266 (0x4f2)
wpa_dbus_dict_get_entry: dict entry key: ca_path2
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path2 - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: bgscan
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=17): [REMOVED]
bgscan - hexdump_ascii(len=17):
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30
30 0
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
Fast associate: Old scan results
wlp1s0b1: Setting scan request: 0.000000 sec
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x16aeca0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16aeca0 after 0.000018 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000063 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.664326 seconds
nl80211: Received scan results (10 BSSes)
wlp1s0b1: BSS: Start scan result update 16
BSS: last_scan_res_used=10/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16aeca0 done in 0.665478 seconds
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:98:f5:8c:f1 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-41 freq=2462
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 1: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-41 freq=2462
wlp1s0b1: skip - blacklisted (count=2 limit=0)
wlp1s0b1: 2: 00:3a:99:d2:64:92 ssid='eduroam' wpa_ie_len=32 rsn_ie_len=28 caps=0x431 level=-73 freq=2412
wlp1s0b1: selected based on RSN IE
wlp1s0b1: selected BSS 00:3a:99:d2:64:92 ssid='eduroam'
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:99:d2:64:92 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16ade00 current_ssid=0x16ade00
wlp1s0b1: Request association with 00:3a:99:d2:64:92
wlp1s0b1: Add radio work 'sme-connect'@0x16aeca0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'sme-connect'@0x16aeca0 after 0.000030 second wait
wlp1s0b1: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=0x16ade00 try_opportunistic=1
RSN: Search for BSSID 00:3a:99:d2:64:92
RSN: Consider 00:3a:99:d2:64:92 for OKC
RSN: No PMKSA cache entry found
wlp1s0b1: RSN: using IEEE 802.11i/D9.0
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2
wlp1s0b1: WPA: Selected mgmt group cipher 32
WPA: set AP WPA IE - hexdump(len=34): dd 20 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 02 00 00 50 f2 01 00 40 96 00 00 00
WPA: set AP RSN IE - hexdump(len=30): 30 1c 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 02 00 00 0f ac 01 00 40 96 00 28 00
wlp1s0b1: WPA: using GTK TKIP
wlp1s0b1: WPA: using PTK CCMP
wlp1s0b1: WPA: using KEY_MGMT 802.1X
wlp1s0b1: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp1s0b1: Cancelling scan request
wlp1s0b1: SME: Trying to authenticate with 00:3a:99:d2:64:92 (SSID='eduroam' freq=2412 MHz)
wlp1s0b1: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlp1s0b1: Determining shared radio frequencies (max len 1)
wlp1s0b1: Shared frequencies (len=0): completed iteration
nl80211: Authenticate (ifindex=2)
* bssid=00:3a:99:d2:64:92
* freq=2412
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1
nl80211: New station 00:3a:99:d2:64:92
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:d2:64:92
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 3a 99 d2 64 92 60 9f 00 00 02 00 00 00
nl80211: Authenticate event
wlp1s0b1: Event AUTH (11) received
wlp1s0b1: SME: Authentication response: peer=00:3a:99:d2:64:92 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp1s0b1: set_disable_max_amsdu: -1
wlp1s0b1: set_ampdu_factor: -1
wlp1s0b1: set_ampdu_density: -1
wlp1s0b1: set_disable_ht40: 0
wlp1s0b1: set_disable_sgi: 0
wlp1s0b1: set_disable_ldpc: 0
wlp1s0b1: Trying to associate with 00:3a:99:d2:64:92 (SSID='eduroam' freq=2412 MHz)
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
nl80211: Associate (ifindex=2)
* bssid=00:3a:99:d2:64:92
* freq=2412
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac02
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/10
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:d2:64:92
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 3a 99 d2 64 92 90 9f 31 04 00 00 05 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
nl80211: Associate event
wlp1s0b1: Event ASSOC (0) received
wlp1s0b1: Association info event
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
wlp1s0b1: freq=2412 MHz
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:99:d2:64:92
wlp1s0b1: Associated with 00:3a:99:d2:64:92
wlp1s0b1: WPA: Association event - clear replay counter
wlp1s0b1: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec
wlp1s0b1: Cancelling scan request
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
nl80211: Event message available
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1
nl80211: Ignore connect event (cmd=46) when using userspace SME
l2_packet_receive: src=00:3a:99:d2:64:92 len=50
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c 70 6f 72 74 69 64 3d 32 39
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=41):
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c am,nasid=WiFi-A,
70 6f 72 74 69 64 3d 32 39 portid=29
EAP: using real identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:99:d2:64:92
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41
EAPOL: SUPP_BE entering state RECEIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=3
* type=0
* alpha2=RU
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=RU (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 40 MHz 20 mBm
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS)
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS)
nl80211: 5735-5835 @ 40 MHz 30 mBm
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
l2_packet_receive: src=00:3a:99:d2:64:92 len=10
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Status notification: accept proposed method (param=PEAP)
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
EAP-PEAP: Forced PEAP version 0
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
TLS: Trusted root certificate(s) loaded
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=0)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
OpenSSL: TX ver=0x303 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x303 content_type=22
OpenSSL: Message - hexdump(len=298): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv2/v3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv2/v3 read server hello A
SSL: SSL_connect - want more data
SSL: 303 bytes pending from ssl_out
SSL: 303 bytes left to be sent out (of total 303 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x168aed0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:99:d2:64:92
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 7e 23 81 cd 11 bb b9 94 83 cf 02 51 a4 3a e8 b3 30 92 1a 5c 72 ce e6 94 92 e1 34 71 9d 19 37 6f 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:99:d2:64:92 len=8
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: Status notification: completion (param=failure)
EAP: EAP entering state FAILURE
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:3a:99:d2:64:92
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed - result=FAILURE
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec
EAPOL: startWhen --> 0
wlp1s0b1: Authentication with 00:3a:99:d2:64:92 timed out.
Added BSSID 00:3a:99:d2:64:92 into blacklist
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Request to deauthenticate - bssid=00:3a:99:d2:64:92 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED
TDLS: Tear down peers
wpa_driver_nl80211_deauthenticate(addr=00:3a:99:d2:64:92 reason_code=3)
wlp1s0b1: Event DEAUTH (12) received
wlp1s0b1: Deauthentication notification
wlp1s0b1: * reason 3 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:99:d2:64:92 reason=3 locally_generated=1
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6)
wlp1s0b1: Setting scan request: 0.100000 sec
wlp1s0b1: Radio work 'sme-connect'@0x16aeca0 done in 2.069717 seconds
BSSID 00:3a:99:d2:64:92 blacklist count incremented to 2
Continuous association failures - consider temporary network disabling
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=2 duration=35 reason=CONN_FAILED
wlp1s0b1: Blacklist count 6 --> request scan in 10000 ms
wlp1s0b1: Ignore new scan request for 10.000000 sec since an earlier request is scheduled to trigger sooner
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Disconnect event - remove keys
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1
nl80211: Delete station 00:3a:99:d2:64:92
nl80211: Event message available
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:99:d2:64:92 A2=74:2f:68:d2:b1:f3
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 99 d2 64 92 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 00 03 00
nl80211: Deauthenticate event
nl80211: Ignore deauth event triggered due to own deauth request
nl80211: Event message available
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1
nl80211: Ignore disconnect event when using userspace SME
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=0
* type=1
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=1
* type=0
* alpha2=BY
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=BY (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 80 MHz 20 mBm
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS)
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS)
nl80211: Added 802.11b mode based on 802.11g information
wlp1s0b1: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x16aeca0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16aeca0 after 0.000021 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000071 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.658529 seconds
nl80211: Received scan results (9 BSSes)
wlp1s0b1: BSS: Start scan result update 17
BSS: last_scan_res_used=9/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP 00:18:e7:fa:7b:45 type 0 added
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP 1c:7e:e5:3e:ad:38 type 0 added
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16aeca0 done in 0.659552 seconds
wlp1s0b1: Postpone network selection by 35 seconds since all networks are disabled
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9
EAPOL: disable timer tick
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16844d0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16844d0 after 0.000112 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000059 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.674765 seconds
nl80211: Received scan results (9 BSSes)
wlp1s0b1: BSS: Start scan result update 18
wlp1s0b1: BSS: Remove id 10 BSSID 00:3a:9a:00:7c:42 SSID 'eduroam' due to no match in scan
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/10'
BSS: last_scan_res_used=9/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16844d0 done in 0.675928 seconds
wlp1s0b1: No APs found - clear blacklist and try again
Removed BSSID 00:3a:99:d2:64:92 from blacklist (clear)
Removed BSSID 00:3a:98:f5:8c:f0 from blacklist (clear)
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: SCANNING -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16844d0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16844d0 after 0.000167 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000060 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.665345 seconds
nl80211: Received scan results (9 BSSes)
wlp1s0b1: BSS: Start scan result update 19
wlp1s0b1: BSS: Add new id 11 BSSID 50:17:ff:dc:2b:41 SSID 'VELCOM WIFI' freq 2412
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/11'
BSS: last_scan_res_used=9/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16844d0 done in 0.666646 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/11) [s]
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16844d0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16844d0 after 0.000159 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000060 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.660321 seconds
nl80211: Received scan results (11 BSSes)
wlp1s0b1: BSS: Start scan result update 20
wlp1s0b1: BSS: Add new id 12 BSSID 12:27:22:d5:d3:50 SSID 'bspu' freq 2437
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/12'
BSS: last_scan_res_used=11/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16844d0 done in 0.661696 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/11
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/12) [s]
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16844d0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16844d0 after 0.000167 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000077 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.658067 seconds
nl80211: Received scan results (9 BSSes)
wlp1s0b1: BSS: Start scan result update 21
BSS: last_scan_res_used=9/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16844d0 done in 0.659107 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16ab2d0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16ab2d0 after 0.000166 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000085 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.659024 seconds
nl80211: Received scan results (10 BSSes)
wlp1s0b1: BSS: Start scan result update 22
wlp1s0b1: BSS: Add new id 13 BSSID 00:3a:9a:00:7c:42 SSID 'eduroam' freq 2437
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/13'
wlp1s0b1: BSS: Remove id 11 BSSID 50:17:ff:dc:2b:41 SSID 'VELCOM WIFI' due to no match in scan
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/11'
wlp1s0b1: BSS: Remove id 12 BSSID 12:27:22:d5:d3:50 SSID 'bspu' due to no match in scan
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/12'
BSS: last_scan_res_used=10/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16ab2d0 done in 0.660485 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/13) [s]
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16ab2d0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16ab2d0 after 0.000167 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000057 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.659728 seconds
nl80211: Received scan results (9 BSSes)
wlp1s0b1: BSS: Start scan result update 23
wlp1s0b1: BSS: Add new id 14 BSSID 0a:27:22:d5:d3:50 SSID 'bspu public' freq 2437
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/14'
BSS: last_scan_res_used=9/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16ab2d0 done in 0.660932 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/13
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/14) [s]
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16ab2d0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16ab2d0 after 0.000225 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000060 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.658605 seconds
nl80211: Received scan results (7 BSSes)
wlp1s0b1: BSS: Start scan result update 24
wlp1s0b1: BSS: Add new id 15 BSSID 50:17:ff:dc:2b:41 SSID 'VELCOM WIFI' freq 2412
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/15'
wlp1s0b1: BSS: Remove id 3 BSSID 28:cf:da:00:f2:f1 SSID 'Point' due to no match in scan
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3'
wlp1s0b1: BSS: Remove id 9 BSSID 50:17:ff:dc:2b:40 SSID 'BELTELECOM' due to no match in scan
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9'
BSS: last_scan_res_used=7/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16ab2d0 done in 0.659887 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/15) [s]
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16ab2d0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16ab2d0 after 0.000170 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000057 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.666001 seconds
nl80211: Received scan results (7 BSSes)
wlp1s0b1: BSS: Start scan result update 25
wlp1s0b1: BSS: Add new id 16 BSSID 28:cf:da:00:f2:f1 SSID 'Point' freq 2462
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16'
wlp1s0b1: BSS: Remove id 13 BSSID 00:3a:9a:00:7c:42 SSID 'eduroam' due to no match in scan
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/13'
wlp1s0b1: BSS: Remove id 14 BSSID 0a:27:22:d5:d3:50 SSID 'bspu public' due to no match in scan
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/14'
BSS: last_scan_res_used=7/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16ab2d0 done in 0.667359 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16) [s]
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16ab2d0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16ab2d0 after 0.000159 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000059 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.660668 seconds
nl80211: Received scan results (11 BSSes)
wlp1s0b1: BSS: Start scan result update 26
wlp1s0b1: BSS: Add new id 17 BSSID 00:3a:9a:00:7c:42 SSID 'eduroam' freq 2437
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17'
wlp1s0b1: BSS: Add new id 18 BSSID 0e:27:22:d5:d3:50 SSID 'bspu guest' freq 2437
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/18'
wlp1s0b1: BSS: Add new id 19 BSSID 50:17:ff:dc:2b:40 SSID 'BELTELECOM' freq 2412
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/19'
wlp1s0b1: BSS: Remove id 15 BSSID 50:17:ff:dc:2b:41 SSID 'VELCOM WIFI' due to no match in scan
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/15'
BSS: last_scan_res_used=11/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16ab2d0 done in 0.662358 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17) [s]
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/18) [s]
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/19) [s]
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16aa5a0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16aa5a0 after 0.000175 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000061 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.658060 seconds
nl80211: Received scan results (10 BSSes)
wlp1s0b1: BSS: Start scan result update 27
wlp1s0b1: BSS: Add new id 20 BSSID 50:17:ff:dc:2b:41 SSID 'VELCOM WIFI' freq 2412
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/20'
BSS: last_scan_res_used=10/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16aa5a0 done in 0.659315 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/20) [s]
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16aef70
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16aef70 after 0.000158 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000062 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.660180 seconds
nl80211: send_and_recv->nl_recvmsgs failed: -33
nl80211: Received scan results (4 BSSes)
wlp1s0b1: BSS: Start scan result update 28
wlp1s0b1: BSS: Remove id 18 BSSID 0e:27:22:d5:d3:50 SSID 'bspu guest' due to no match in scan
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/18'
wlp1s0b1: BSS: Remove id 19 BSSID 50:17:ff:dc:2b:40 SSID 'BELTELECOM' due to no match in scan
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/19'
BSS: last_scan_res_used=4/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16aef70 done in 0.661405 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv]
properties_get_or_set: Set(ApScan)
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
wpa_dbus_dict_open_read: start reading a dict entry
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
proactive_key_caching=1 (0x1)
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate
ENGINE: engine deinit
wpa_dbus_dict_get_entry: dict entry key: password
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=6): [REMOVED]
password - hexdump_ascii(len=6): [REMOVED]
wpa_dbus_dict_get_entry: dict entry key: phase1
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase1 - hexdump_ascii(len=9):
70 65 61 70 76 65 72 3d 30 peapver=0
wpa_dbus_dict_get_entry: dict entry key: eap
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
wpa_dbus_dict_get_entry: dict entry key: phase2
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
wpa_dbus_dict_get_entry: dict entry key: ca_path
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: ssid
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=7): [REMOVED]
ssid - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wpa_dbus_dict_get_entry: dict entry key: key_mgmt
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
key_mgmt: 0x1
wpa_dbus_dict_get_entry: dict entry key: identity
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=12): [REMOVED]
identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED
wpa_dbus_dict_get_entry: dict entry key: scan_ssid
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
scan_ssid=1 (0x1)
wpa_dbus_dict_get_entry: dict entry key: fragment_size
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266
fragment_size=1266 (0x4f2)
wpa_dbus_dict_get_entry: dict entry key: ca_path2
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path2 - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: bgscan
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=17): [REMOVED]
bgscan - hexdump_ascii(len=17):
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30
30 0
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
Fast associate: Old scan results
wlp1s0b1: Setting scan request: 0.000000 sec
wlp1s0b1: State: INACTIVE -> SCANNING
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x16a3a80
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16a3a80 after 0.000017 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000105 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.660441 seconds
nl80211: Received scan results (9 BSSes)
wlp1s0b1: BSS: Start scan result update 29
wlp1s0b1: BSS: Remove id 20 BSSID 50:17:ff:dc:2b:41 SSID 'VELCOM WIFI' due to no match in scan
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/20'
BSS: last_scan_res_used=9/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16a3a80 done in 0.663193 seconds
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:98:f5:8c:f1 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-48 freq=2462
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 1: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-56 freq=2462
wlp1s0b1: selected based on RSN IE
wlp1s0b1: selected BSS 00:3a:98:f5:8c:f0 ssid='eduroam'
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:98:f5:8c:f0 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16ae730 current_ssid=0x16ae730
wlp1s0b1: Request association with 00:3a:98:f5:8c:f0
wlp1s0b1: Add radio work 'sme-connect'@0x16a3a80
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'sme-connect'@0x16a3a80 after 0.000028 second wait
wlp1s0b1: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=0x16ae730 try_opportunistic=1
RSN: Search for BSSID 00:3a:98:f5:8c:f0
RSN: Consider 00:3a:98:f5:8c:f0 for OKC
RSN: No PMKSA cache entry found
wlp1s0b1: RSN: using IEEE 802.11i/D9.0
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2
wlp1s0b1: WPA: Selected mgmt group cipher 32
wlp1s0b1: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00
wlp1s0b1: WPA: using GTK TKIP
wlp1s0b1: WPA: using PTK CCMP
wlp1s0b1: WPA: using KEY_MGMT 802.1X
wlp1s0b1: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp1s0b1: Cancelling scan request
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:8c:f0 (SSID='eduroam' freq=2462 MHz)
wlp1s0b1: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlp1s0b1: Determining shared radio frequencies (max len 1)
wlp1s0b1: Shared frequencies (len=0): completed iteration
nl80211: Authenticate (ifindex=2)
* bssid=00:3a:98:f5:8c:f0
* freq=2462
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1
nl80211: New station 00:3a:98:f5:8c:f0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:8c:f0
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 3a 98 f5 8c f0 b0 dd 00 00 02 00 00 00
nl80211: Authenticate event
wlp1s0b1: Event AUTH (11) received
wlp1s0b1: SME: Authentication response: peer=00:3a:98:f5:8c:f0 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp1s0b1: set_disable_max_amsdu: -1
wlp1s0b1: set_ampdu_factor: -1
wlp1s0b1: set_ampdu_density: -1
wlp1s0b1: set_disable_ht40: 0
wlp1s0b1: set_disable_sgi: 0
wlp1s0b1: set_disable_ldpc: 0
wlp1s0b1: Trying to associate with 00:3a:98:f5:8c:f0 (SSID='eduroam' freq=2462 MHz)
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
nl80211: Associate (ifindex=2)
* bssid=00:3a:98:f5:8c:f0
* freq=2462
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac02
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:8c:f0
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 3a 98 f5 8c f0 d0 dd 31 04 00 00 02 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
nl80211: Associate event
wlp1s0b1: Event ASSOC (0) received
wlp1s0b1: Association info event
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
wlp1s0b1: freq=2462 MHz
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:98:f5:8c:f0
wlp1s0b1: Associated with 00:3a:98:f5:8c:f0
wlp1s0b1: WPA: Association event - clear replay counter
wlp1s0b1: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec
wlp1s0b1: Cancelling scan request
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1
nl80211: Ignore connect event (cmd=46) when using userspace SME
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=50
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c 70 6f 72 74 69 64 3d 32 39
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=41):
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c am,nasid=WiFi-B,
70 6f 72 74 69 64 3d 32 39 portid=29
EAP: using real identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:8c:f0
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=10
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Status notification: accept proposed method (param=PEAP)
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
EAP-PEAP: Forced PEAP version 0
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
TLS: Trusted root certificate(s) loaded
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=0)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
OpenSSL: TX ver=0x303 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x303 content_type=22
OpenSSL: Message - hexdump(len=298): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv2/v3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv2/v3 read server hello A
SSL: SSL_connect - want more data
SSL: 303 bytes pending from ssl_out
SSL: 303 bytes left to be sent out (of total 303 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1685b90
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:8c:f0
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 47 aa a0 c8 f0 42 1c 3c a8 07 74 90 a7 02 2c 4b 3a 24 ec 1b 1b 9c 72 4d 93 53 f6 e4 7d 40 05 9b 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=8
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: Status notification: completion (param=failure)
EAP: EAP entering state FAILURE
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:3a:98:f5:8c:f0
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed - result=FAILURE
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=3
* type=0
* alpha2=RU
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=RU (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 40 MHz 20 mBm
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS)
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS)
nl80211: 5735-5835 @ 40 MHz 30 mBm
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
EAPOL: startWhen --> 0
wlp1s0b1: Authentication with 00:3a:98:f5:8c:f0 timed out.
Added BSSID 00:3a:98:f5:8c:f0 into blacklist
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Request to deauthenticate - bssid=00:3a:98:f5:8c:f0 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED
TDLS: Tear down peers
wpa_driver_nl80211_deauthenticate(addr=00:3a:98:f5:8c:f0 reason_code=3)
wlp1s0b1: Event DEAUTH (12) received
wlp1s0b1: Deauthentication notification
wlp1s0b1: * reason 3 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:98:f5:8c:f0 reason=3 locally_generated=1
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6)
wlp1s0b1: Setting scan request: 0.100000 sec
wlp1s0b1: Radio work 'sme-connect'@0x16a3a80 done in 2.073025 seconds
BSSID 00:3a:98:f5:8c:f0 blacklist count incremented to 2
Continuous association failures - consider temporary network disabling
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=2 duration=33 reason=CONN_FAILED
wlp1s0b1: Blacklist count 8 --> request scan in 10000 ms
wlp1s0b1: Ignore new scan request for 10.000000 sec since an earlier request is scheduled to trigger sooner
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Disconnect event - remove keys
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1
nl80211: Delete station 00:3a:98:f5:8c:f0
nl80211: Event message available
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:98:f5:8c:f0 A2=74:2f:68:d2:b1:f3
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 98 f5 8c f0 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 00 03 00
nl80211: Deauthenticate event
nl80211: Ignore deauth event triggered due to own deauth request
nl80211: Event message available
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1
nl80211: Ignore disconnect event when using userspace SME
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=0
* type=1
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=1
* type=0
* alpha2=BY
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=BY (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 80 MHz 20 mBm
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS)
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS)
nl80211: Added 802.11b mode based on 802.11g information
wlp1s0b1: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x16af3f0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16af3f0 after 0.000024 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000058 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.660059 seconds
nl80211: Received scan results (10 BSSes)
wlp1s0b1: BSS: Start scan result update 30
wlp1s0b1: BSS: Add new id 21 BSSID 0e:27:22:d5:d3:50 SSID 'bspu guest' freq 2437
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/21'
BSS: last_scan_res_used=10/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP 1c:7e:e5:3e:ad:38 type 0 added
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP 00:18:e7:fa:7b:45 type 0 added
WPS: AP[0] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16af3f0 done in 0.661405 seconds
wlp1s0b1: Postpone network selection by 32 seconds since all networks are disabled
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/21) [s]
EAPOL: disable timer tick
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv]
properties_get_or_set: Set(ApScan)
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
wpa_dbus_dict_open_read: start reading a dict entry
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
proactive_key_caching=1 (0x1)
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate
ENGINE: engine deinit
wpa_dbus_dict_get_entry: dict entry key: password
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=6): [REMOVED]
password - hexdump_ascii(len=6): [REMOVED]
wpa_dbus_dict_get_entry: dict entry key: phase1
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase1 - hexdump_ascii(len=9):
70 65 61 70 76 65 72 3d 30 peapver=0
wpa_dbus_dict_get_entry: dict entry key: eap
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
wpa_dbus_dict_get_entry: dict entry key: phase2
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
wpa_dbus_dict_get_entry: dict entry key: ca_path
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: ssid
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=7): [REMOVED]
ssid - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wpa_dbus_dict_get_entry: dict entry key: key_mgmt
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
key_mgmt: 0x1
wpa_dbus_dict_get_entry: dict entry key: identity
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=12): [REMOVED]
identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED
wpa_dbus_dict_get_entry: dict entry key: scan_ssid
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
scan_ssid=1 (0x1)
wpa_dbus_dict_get_entry: dict entry key: fragment_size
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266
fragment_size=1266 (0x4f2)
wpa_dbus_dict_get_entry: dict entry key: ca_path2
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path2 - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: bgscan
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=17): [REMOVED]
bgscan - hexdump_ascii(len=17):
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30
30 0
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
Fast associate: Old scan results
wlp1s0b1: Setting scan request: 0.000000 sec
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x16abc20
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16abc20 after 0.000017 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000055 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.670663 seconds
nl80211: Received scan results (10 BSSes)
wlp1s0b1: BSS: Start scan result update 31
BSS: last_scan_res_used=10/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16abc20 done in 0.671675 seconds
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-43 freq=2462
wlp1s0b1: skip - blacklisted (count=2 limit=0)
wlp1s0b1: 1: 00:3a:98:f5:8c:f1 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-44 freq=2462
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 2: 00:3a:99:d2:64:92 ssid='eduroam' wpa_ie_len=32 rsn_ie_len=28 caps=0x431 level=-77 freq=2412
wlp1s0b1: selected based on RSN IE
wlp1s0b1: selected BSS 00:3a:99:d2:64:92 ssid='eduroam'
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:99:d2:64:92 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16ae730 current_ssid=0x16ae730
wlp1s0b1: Request association with 00:3a:99:d2:64:92
wlp1s0b1: Re-association to the same ESS
wlp1s0b1: Add radio work 'sme-connect'@0x16abc20
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'sme-connect'@0x16abc20 after 0.000026 second wait
wlp1s0b1: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=0x16ae730 try_opportunistic=1
RSN: Search for BSSID 00:3a:99:d2:64:92
RSN: Consider 00:3a:99:d2:64:92 for OKC
RSN: No PMKSA cache entry found
wlp1s0b1: RSN: using IEEE 802.11i/D9.0
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2
wlp1s0b1: WPA: Selected mgmt group cipher 32
WPA: set AP WPA IE - hexdump(len=34): dd 20 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 02 00 00 50 f2 01 00 40 96 00 00 00
WPA: set AP RSN IE - hexdump(len=30): 30 1c 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 02 00 00 0f ac 01 00 40 96 00 28 00
wlp1s0b1: WPA: using GTK TKIP
wlp1s0b1: WPA: using PTK CCMP
wlp1s0b1: WPA: using KEY_MGMT 802.1X
wlp1s0b1: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp1s0b1: Cancelling scan request
wlp1s0b1: SME: Trying to authenticate with 00:3a:99:d2:64:92 (SSID='eduroam' freq=2412 MHz)
wlp1s0b1: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlp1s0b1: Determining shared radio frequencies (max len 1)
wlp1s0b1: Shared frequencies (len=0): completed iteration
nl80211: Authenticate (ifindex=2)
* bssid=00:3a:99:d2:64:92
* freq=2412
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1
nl80211: New station 00:3a:99:d2:64:92
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:d2:64:92
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 3a 99 d2 64 92 e0 42 00 00 02 00 00 00
nl80211: Authenticate event
wlp1s0b1: Event AUTH (11) received
wlp1s0b1: SME: Authentication response: peer=00:3a:99:d2:64:92 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp1s0b1: set_disable_max_amsdu: -1
wlp1s0b1: set_ampdu_factor: -1
wlp1s0b1: set_ampdu_density: -1
wlp1s0b1: set_disable_ht40: 0
wlp1s0b1: set_disable_sgi: 0
wlp1s0b1: set_disable_ldpc: 0
wlp1s0b1: Trying to associate with 00:3a:99:d2:64:92 (SSID='eduroam' freq=2412 MHz)
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
nl80211: Associate (ifindex=2)
* bssid=00:3a:99:d2:64:92
* freq=2412
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac02
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/21
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:d2:64:92
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 3a 99 d2 64 92 f0 42 31 04 00 00 05 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
nl80211: Associate event
wlp1s0b1: Event ASSOC (0) received
wlp1s0b1: Association info event
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
wlp1s0b1: freq=2412 MHz
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:99:d2:64:92
wlp1s0b1: Associated with 00:3a:99:d2:64:92
wlp1s0b1: WPA: Association event - clear replay counter
wlp1s0b1: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec
wlp1s0b1: Cancelling scan request
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
nl80211: Event message available
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1
nl80211: Ignore connect event (cmd=46) when using userspace SME
l2_packet_receive: src=00:3a:99:d2:64:92 len=50
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c 70 6f 72 74 69 64 3d 32 39
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=41):
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c am,nasid=WiFi-A,
70 6f 72 74 69 64 3d 32 39 portid=29
EAP: using real identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:99:d2:64:92
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41
EAPOL: SUPP_BE entering state RECEIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=3
* type=0
* alpha2=RU
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=RU (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 40 MHz 20 mBm
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS)
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS)
nl80211: 5735-5835 @ 40 MHz 30 mBm
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
l2_packet_receive: src=00:3a:99:d2:64:92 len=10
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Status notification: accept proposed method (param=PEAP)
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
EAP-PEAP: Forced PEAP version 0
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
TLS: Trusted root certificate(s) loaded
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=0)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
OpenSSL: TX ver=0x303 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x303 content_type=22
OpenSSL: Message - hexdump(len=298): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv2/v3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv2/v3 read server hello A
SSL: SSL_connect - want more data
SSL: 303 bytes pending from ssl_out
SSL: 303 bytes left to be sent out (of total 303 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x16aedc0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:99:d2:64:92
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 20 20 3c 68 f9 00 f1 86 ec df 79 2e 54 87 f0 34 5e 68 90 9a e3 83 e5 6c 64 34 c5 39 6a 67 fe 06 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:99:d2:64:92 len=8
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: Status notification: completion (param=failure)
EAP: EAP entering state FAILURE
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:3a:99:d2:64:92
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed - result=FAILURE
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec
EAPOL: startWhen --> 0
wlp1s0b1: Authentication with 00:3a:99:d2:64:92 timed out.
Added BSSID 00:3a:99:d2:64:92 into blacklist
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Request to deauthenticate - bssid=00:3a:99:d2:64:92 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED
TDLS: Tear down peers
wpa_driver_nl80211_deauthenticate(addr=00:3a:99:d2:64:92 reason_code=3)
wlp1s0b1: Event DEAUTH (12) received
wlp1s0b1: Deauthentication notification
wlp1s0b1: * reason 3 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:99:d2:64:92 reason=3 locally_generated=1
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6)
wlp1s0b1: Setting scan request: 0.100000 sec
wlp1s0b1: Radio work 'sme-connect'@0x16abc20 done in 2.058040 seconds
BSSID 00:3a:99:d2:64:92 blacklist count incremented to 2
Continuous association failures - consider temporary network disabling
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=2 duration=35 reason=CONN_FAILED
wlp1s0b1: Blacklist count 8 --> request scan in 10000 ms
wlp1s0b1: Ignore new scan request for 10.000000 sec since an earlier request is scheduled to trigger sooner
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Disconnect event - remove keys
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1
nl80211: Delete station 00:3a:99:d2:64:92
nl80211: Event message available
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:99:d2:64:92 A2=74:2f:68:d2:b1:f3
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 99 d2 64 92 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 00 03 00
nl80211: Deauthenticate event
nl80211: Ignore deauth event triggered due to own deauth request
nl80211: Event message available
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1
nl80211: Ignore disconnect event when using userspace SME
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=0
* type=1
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=1
* type=0
* alpha2=BY
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=BY (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 80 MHz 20 mBm
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS)
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS)
nl80211: Added 802.11b mode based on 802.11g information
wlp1s0b1: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x16ac0e0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16ac0e0 after 0.000021 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000071 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.673201 seconds
nl80211: Received scan results (12 BSSes)
wlp1s0b1: BSS: Start scan result update 32
wlp1s0b1: BSS: Add new id 22 BSSID 50:17:ff:dc:2b:41 SSID 'VELCOM WIFI' freq 2412
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/22'
wlp1s0b1: BSS: Add new id 23 BSSID 50:17:ff:dc:2b:40 SSID 'BELTELECOM' freq 2412
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/23'
BSS: last_scan_res_used=12/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP 00:18:e7:fa:7b:45 type 0 added
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP 1c:7e:e5:3e:ad:38 type 0 added
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16ac0e0 done in 0.674888 seconds
wlp1s0b1: Postpone network selection by 34 seconds since all networks are disabled
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/21
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/22) [s]
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/23) [s]
EAPOL: disable timer tick
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
wlp1s0b1: Try to associate due to network getting re-enabled
Fast associate: Old scan results
wlp1s0b1: Setting scan request: 0.000000 sec
wlp1s0b1: No enabled networks - do not scan
wlp1s0b1: State: SCANNING -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16af3f0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16af3f0 after 0.000165 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000083 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.658208 seconds
nl80211: Received scan results (9 BSSes)
wlp1s0b1: BSS: Start scan result update 33
BSS: last_scan_res_used=9/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16af3f0 done in 0.659254 seconds
wlp1s0b1: No APs found - clear blacklist and try again
Removed BSSID 00:3a:99:d2:64:92 from blacklist (clear)
Removed BSSID 00:3a:98:f5:8c:f0 from blacklist (clear)
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/23
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16af3f0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16af3f0 after 0.000153 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000058 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.658620 seconds
nl80211: Received scan results (12 BSSes)
wlp1s0b1: BSS: Start scan result update 34
wlp1s0b1: BSS: Add new id 24 BSSID 02:1a:11:f8:8a:47 SSID 'taxi5' freq 2437
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/24'
wlp1s0b1: BSS: Remove id 22 BSSID 50:17:ff:dc:2b:41 SSID 'VELCOM WIFI' due to no match in scan
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/22'
BSS: last_scan_res_used=12/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16af3f0 done in 0.659973 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/21
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/23
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/24) [s]
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16a4eb0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16a4eb0 after 0.000178 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000067 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.657414 seconds
nl80211: Received scan results (13 BSSes)
wlp1s0b1: BSS: Start scan result update 35
wlp1s0b1: BSS: Add new id 25 BSSID 12:27:22:d5:d3:50 SSID 'bspu' freq 2437
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/25'
BSS: last_scan_res_used=13/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16a4eb0 done in 0.658721 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/21
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/23
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/24
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/25) [s]
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16aee70
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16aee70 after 0.000188 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000059 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.664355 seconds
nl80211: Received scan results (9 BSSes)
wlp1s0b1: BSS: Start scan result update 36
BSS: last_scan_res_used=9/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16aee70 done in 0.665541 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/23
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x16abd20
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16abd20 after 0.000178 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000063 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.665167 seconds
nl80211: Received scan results (8 BSSes)
wlp1s0b1: BSS: Start scan result update 37
wlp1s0b1: BSS: Remove id 17 BSSID 00:3a:9a:00:7c:42 SSID 'eduroam' due to no match in scan
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17'
wlp1s0b1: BSS: Remove id 25 BSSID 12:27:22:d5:d3:50 SSID 'bspu' due to no match in scan
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/25'
wlp1s0b1: BSS: Remove id 21 BSSID 0e:27:22:d5:d3:50 SSID 'bspu guest' due to no match in scan
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/21'
wlp1s0b1: BSS: Remove id 24 BSSID 02:1a:11:f8:8a:47 SSID 'taxi5' due to no match in scan
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/24'
BSS: last_scan_res_used=8/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16abd20 done in 0.666531 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv]
properties_get_or_set: Set(ApScan)
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
wpa_dbus_dict_open_read: start reading a dict entry
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
proactive_key_caching=1 (0x1)
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate
ENGINE: engine deinit
wpa_dbus_dict_get_entry: dict entry key: password
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=6): [REMOVED]
password - hexdump_ascii(len=6): [REMOVED]
wpa_dbus_dict_get_entry: dict entry key: phase1
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase1 - hexdump_ascii(len=9):
70 65 61 70 76 65 72 3d 30 peapver=0
wpa_dbus_dict_get_entry: dict entry key: eap
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
wpa_dbus_dict_get_entry: dict entry key: phase2
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
wpa_dbus_dict_get_entry: dict entry key: ca_path
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: ssid
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=7): [REMOVED]
ssid - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wpa_dbus_dict_get_entry: dict entry key: key_mgmt
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
key_mgmt: 0x1
wpa_dbus_dict_get_entry: dict entry key: identity
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=12): [REMOVED]
identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED
wpa_dbus_dict_get_entry: dict entry key: scan_ssid
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
scan_ssid=1 (0x1)
wpa_dbus_dict_get_entry: dict entry key: fragment_size
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266
fragment_size=1266 (0x4f2)
wpa_dbus_dict_get_entry: dict entry key: ca_path2
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path2 - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: bgscan
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=17): [REMOVED]
bgscan - hexdump_ascii(len=17):
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30
30 0
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
Fast associate: Old scan results
wlp1s0b1: Setting scan request: 0.000000 sec
wlp1s0b1: State: INACTIVE -> SCANNING
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x16a3660
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16a3660 after 0.000080 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000081 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.666594 seconds
nl80211: Received scan results (10 BSSes)
wlp1s0b1: BSS: Start scan result update 38
wlp1s0b1: BSS: Add new id 26 BSSID 00:3a:9a:00:7c:42 SSID 'eduroam' freq 2437
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/26'
wlp1s0b1: BSS: Add new id 27 BSSID 0a:27:22:d5:d3:50 SSID 'bspu public' freq 2437
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/27'
wlp1s0b1: BSS: Remove id 23 BSSID 50:17:ff:dc:2b:40 SSID 'BELTELECOM' due to no match in scan
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/23'
BSS: last_scan_res_used=10/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16a3660 done in 0.668079 seconds
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:98:f5:8c:f1 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-49 freq=2462
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 1: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-50 freq=2462
wlp1s0b1: selected based on RSN IE
wlp1s0b1: selected BSS 00:3a:98:f5:8c:f0 ssid='eduroam'
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:98:f5:8c:f0 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16ae730 current_ssid=0x16ae730
wlp1s0b1: Request association with 00:3a:98:f5:8c:f0
wlp1s0b1: Re-association to the same ESS
wlp1s0b1: Add radio work 'sme-connect'@0x16a3660
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'sme-connect'@0x16a3660 after 0.000030 second wait
wlp1s0b1: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=0x16ae730 try_opportunistic=1
RSN: Search for BSSID 00:3a:98:f5:8c:f0
RSN: Consider 00:3a:98:f5:8c:f0 for OKC
RSN: No PMKSA cache entry found
wlp1s0b1: RSN: using IEEE 802.11i/D9.0
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2
wlp1s0b1: WPA: Selected mgmt group cipher 32
wlp1s0b1: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00
wlp1s0b1: WPA: using GTK TKIP
wlp1s0b1: WPA: using PTK CCMP
wlp1s0b1: WPA: using KEY_MGMT 802.1X
wlp1s0b1: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp1s0b1: Cancelling scan request
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:8c:f0 (SSID='eduroam' freq=2462 MHz)
wlp1s0b1: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlp1s0b1: Determining shared radio frequencies (max len 1)
wlp1s0b1: Shared frequencies (len=0): completed iteration
nl80211: Authenticate (ifindex=2)
* bssid=00:3a:98:f5:8c:f0
* freq=2462
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1
nl80211: New station 00:3a:98:f5:8c:f0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:8c:f0
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 3a 98 f5 8c f0 80 16 00 00 02 00 00 00
nl80211: Authenticate event
wlp1s0b1: Event AUTH (11) received
wlp1s0b1: SME: Authentication response: peer=00:3a:98:f5:8c:f0 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp1s0b1: set_disable_max_amsdu: -1
wlp1s0b1: set_ampdu_factor: -1
wlp1s0b1: set_ampdu_density: -1
wlp1s0b1: set_disable_ht40: 0
wlp1s0b1: set_disable_sgi: 0
wlp1s0b1: set_disable_ldpc: 0
wlp1s0b1: Trying to associate with 00:3a:98:f5:8c:f0 (SSID='eduroam' freq=2462 MHz)
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
nl80211: Associate (ifindex=2)
* bssid=00:3a:98:f5:8c:f0
* freq=2462
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac02
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:8c:f0
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 3a 98 f5 8c f0 90 16 31 04 00 00 02 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
nl80211: Associate event
wlp1s0b1: Event ASSOC (0) received
wlp1s0b1: Association info event
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
wlp1s0b1: freq=2462 MHz
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:98:f5:8c:f0
wlp1s0b1: Associated with 00:3a:98:f5:8c:f0
wlp1s0b1: WPA: Association event - clear replay counter
wlp1s0b1: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec
wlp1s0b1: Cancelling scan request
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
nl80211: Event message available
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1
nl80211: Ignore connect event (cmd=46) when using userspace SME
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=50
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c 70 6f 72 74 69 64 3d 32 39
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=41):
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c am,nasid=WiFi-B,
70 6f 72 74 69 64 3d 32 39 portid=29
EAP: using real identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:8c:f0
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41
EAPOL: SUPP_BE entering state RECEIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=3
* type=0
* alpha2=RU
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=RU (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 40 MHz 20 mBm
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS)
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS)
nl80211: 5735-5835 @ 40 MHz 30 mBm
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=10
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Status notification: accept proposed method (param=PEAP)
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
EAP-PEAP: Forced PEAP version 0
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
TLS: Trusted root certificate(s) loaded
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=0)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
OpenSSL: TX ver=0x303 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x303 content_type=22
OpenSSL: Message - hexdump(len=298): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv2/v3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv2/v3 read server hello A
SSL: SSL_connect - want more data
SSL: 303 bytes pending from ssl_out
SSL: 303 bytes left to be sent out (of total 303 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x16aeec0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:8c:f0
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 cf 54 28 fd 16 4f 2a 0e 31 93 36 4a fe 08 23 69 99 92 94 1a 73 51 34 3b 40 f8 f8 77 b6 a2 14 89 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=8
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: Status notification: completion (param=failure)
EAP: EAP entering state FAILURE
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:3a:98:f5:8c:f0
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed - result=FAILURE
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/26) [s]
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/27) [s]
EAPOL: startWhen --> 0
wlp1s0b1: Authentication with 00:3a:98:f5:8c:f0 timed out.
Added BSSID 00:3a:98:f5:8c:f0 into blacklist
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Request to deauthenticate - bssid=00:3a:98:f5:8c:f0 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED
TDLS: Tear down peers
wpa_driver_nl80211_deauthenticate(addr=00:3a:98:f5:8c:f0 reason_code=3)
wlp1s0b1: Event DEAUTH (12) received
wlp1s0b1: Deauthentication notification
wlp1s0b1: * reason 3 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:98:f5:8c:f0 reason=3 locally_generated=1
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6)
wlp1s0b1: Setting scan request: 0.100000 sec
wlp1s0b1: Radio work 'sme-connect'@0x16a3660 done in 2.044565 seconds
BSSID 00:3a:98:f5:8c:f0 blacklist count incremented to 2
Continuous association failures - consider temporary network disabling
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=2 duration=26 reason=CONN_FAILED
wlp1s0b1: Blacklist count 10 --> request scan in 10000 ms
wlp1s0b1: Ignore new scan request for 10.000000 sec since an earlier request is scheduled to trigger sooner
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Disconnect event - remove keys
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1
nl80211: Delete station 00:3a:98:f5:8c:f0
nl80211: Event message available
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:98:f5:8c:f0 A2=74:2f:68:d2:b1:f3
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 98 f5 8c f0 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 00 03 00
nl80211: Deauthenticate event
nl80211: Ignore deauth event triggered due to own deauth request
nl80211: Event message available
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1
nl80211: Ignore disconnect event when using userspace SME
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=0
* type=1
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=1
* type=0
* alpha2=BY
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=BY (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 80 MHz 20 mBm
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS)
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS)
nl80211: Added 802.11b mode based on 802.11g information
wlp1s0b1: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x16af3f0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16af3f0 after 0.000035 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000066 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.663136 seconds
nl80211: Received scan results (10 BSSes)
wlp1s0b1: BSS: Start scan result update 39
BSS: last_scan_res_used=10/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP 1c:7e:e5:3e:ad:38 type 0 added
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP 00:18:e7:fa:7b:45 type 0 added
WPS: AP[0] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16af3f0 done in 0.664290 seconds
wlp1s0b1: Postpone network selection by 25 seconds since all networks are disabled
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/26
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/27
EAPOL: disable timer tick
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
wlp1s0b1: Try to associate due to network getting re-enabled
Fast associate: Old scan results
wlp1s0b1: Setting scan request: 0.000000 sec
wlp1s0b1: No enabled networks - do not scan
wlp1s0b1: State: SCANNING -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv]
properties_get_or_set: Set(ApScan)
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
wpa_dbus_dict_open_read: start reading a dict entry
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
proactive_key_caching=1 (0x1)
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate
ENGINE: engine deinit
wpa_dbus_dict_get_entry: dict entry key: password
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=6): [REMOVED]
password - hexdump_ascii(len=6): [REMOVED]
wpa_dbus_dict_get_entry: dict entry key: phase1
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase1 - hexdump_ascii(len=9):
70 65 61 70 76 65 72 3d 30 peapver=0
wpa_dbus_dict_get_entry: dict entry key: eap
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
wpa_dbus_dict_get_entry: dict entry key: phase2
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
wpa_dbus_dict_get_entry: dict entry key: ca_path
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: ssid
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=7): [REMOVED]
ssid - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wpa_dbus_dict_get_entry: dict entry key: key_mgmt
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
key_mgmt: 0x1
wpa_dbus_dict_get_entry: dict entry key: identity
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=12): [REMOVED]
identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED
wpa_dbus_dict_get_entry: dict entry key: scan_ssid
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
scan_ssid=1 (0x1)
wpa_dbus_dict_get_entry: dict entry key: fragment_size
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266
fragment_size=1266 (0x4f2)
wpa_dbus_dict_get_entry: dict entry key: ca_path2
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path2 - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: bgscan
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=17): [REMOVED]
bgscan - hexdump_ascii(len=17):
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30
30 0
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
Fast associate: Old scan results
wlp1s0b1: Setting scan request: 0.000000 sec
wlp1s0b1: State: INACTIVE -> SCANNING
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x16a4ad0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16a4ad0 after 0.000017 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000058 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.662012 seconds
nl80211: Received scan results (10 BSSes)
wlp1s0b1: BSS: Start scan result update 40
BSS: last_scan_res_used=10/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16a4ad0 done in 0.663022 seconds
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:98:f5:8c:f1 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-47 freq=2462
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 1: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-48 freq=2462
wlp1s0b1: skip - blacklisted (count=2 limit=0)
wlp1s0b1: 2: 00:3a:99:d2:64:92 ssid='eduroam' wpa_ie_len=32 rsn_ie_len=28 caps=0x431 level=-72 freq=2412
wlp1s0b1: selected based on RSN IE
wlp1s0b1: selected BSS 00:3a:99:d2:64:92 ssid='eduroam'
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:99:d2:64:92 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16abcf0 current_ssid=0x16abcf0
wlp1s0b1: Request association with 00:3a:99:d2:64:92
wlp1s0b1: Add radio work 'sme-connect'@0x16a4ad0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'sme-connect'@0x16a4ad0 after 0.000027 second wait
wlp1s0b1: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=0x16abcf0 try_opportunistic=1
RSN: Search for BSSID 00:3a:99:d2:64:92
RSN: Consider 00:3a:99:d2:64:92 for OKC
RSN: No PMKSA cache entry found
wlp1s0b1: RSN: using IEEE 802.11i/D9.0
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2
wlp1s0b1: WPA: Selected mgmt group cipher 32
WPA: set AP WPA IE - hexdump(len=34): dd 20 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 02 00 00 50 f2 01 00 40 96 00 00 00
WPA: set AP RSN IE - hexdump(len=30): 30 1c 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 02 00 00 0f ac 01 00 40 96 00 28 00
wlp1s0b1: WPA: using GTK TKIP
wlp1s0b1: WPA: using PTK CCMP
wlp1s0b1: WPA: using KEY_MGMT 802.1X
wlp1s0b1: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp1s0b1: Cancelling scan request
wlp1s0b1: SME: Trying to authenticate with 00:3a:99:d2:64:92 (SSID='eduroam' freq=2412 MHz)
wlp1s0b1: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlp1s0b1: Determining shared radio frequencies (max len 1)
wlp1s0b1: Shared frequencies (len=0): completed iteration
nl80211: Authenticate (ifindex=2)
* bssid=00:3a:99:d2:64:92
* freq=2412
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1
nl80211: New station 00:3a:99:d2:64:92
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/26
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/27
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:d2:64:92
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 3a 99 d2 64 92 10 ba 00 00 02 00 00 00
nl80211: Authenticate event
wlp1s0b1: Event AUTH (11) received
wlp1s0b1: SME: Authentication response: peer=00:3a:99:d2:64:92 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp1s0b1: set_disable_max_amsdu: -1
wlp1s0b1: set_ampdu_factor: -1
wlp1s0b1: set_ampdu_density: -1
wlp1s0b1: set_disable_ht40: 0
wlp1s0b1: set_disable_sgi: 0
wlp1s0b1: set_disable_ldpc: 0
wlp1s0b1: Trying to associate with 00:3a:99:d2:64:92 (SSID='eduroam' freq=2412 MHz)
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
nl80211: Associate (ifindex=2)
* bssid=00:3a:99:d2:64:92
* freq=2412
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac02
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:d2:64:92
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 3a 99 d2 64 92 20 ba 31 04 00 00 05 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
nl80211: Associate event
wlp1s0b1: Event ASSOC (0) received
wlp1s0b1: Association info event
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
wlp1s0b1: freq=2412 MHz
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:99:d2:64:92
wlp1s0b1: Associated with 00:3a:99:d2:64:92
wlp1s0b1: WPA: Association event - clear replay counter
wlp1s0b1: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec
wlp1s0b1: Cancelling scan request
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
nl80211: Event message available
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1
nl80211: Ignore connect event (cmd=46) when using userspace SME
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=3
* type=0
* alpha2=RU
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=RU (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 40 MHz 20 mBm
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS)
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS)
nl80211: 5735-5835 @ 40 MHz 30 mBm
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
l2_packet_receive: src=00:3a:99:d2:64:92 len=50
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c 70 6f 72 74 69 64 3d 32 39
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=41):
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c am,nasid=WiFi-A,
70 6f 72 74 69 64 3d 32 39 portid=29
EAP: using real identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:99:d2:64:92
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:99:d2:64:92 len=10
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Status notification: accept proposed method (param=PEAP)
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
EAP-PEAP: Forced PEAP version 0
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
TLS: Trusted root certificate(s) loaded
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=0)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
OpenSSL: TX ver=0x303 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x303 content_type=22
OpenSSL: Message - hexdump(len=298): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv2/v3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv2/v3 read server hello A
SSL: SSL_connect - want more data
SSL: 303 bytes pending from ssl_out
SSL: 303 bytes left to be sent out (of total 303 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x16a8f10
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:99:d2:64:92
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 36 e4 16 c9 7b 69 34 95 8d ee c0 eb bd ce 24 04 7a 03 c2 c5 0f 44 f9 e3 22 f3 ac 6f fb 93 77 cf 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
wlp1s0b1: Request to deauthenticate - bssid=00:3a:99:d2:64:92 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED
TDLS: Tear down peers
wpa_driver_nl80211_deauthenticate(addr=00:3a:99:d2:64:92 reason_code=3)
wlp1s0b1: Event DEAUTH (12) received
wlp1s0b1: Deauthentication notification
wlp1s0b1: * reason 3 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:99:d2:64:92 reason=3 locally_generated=1
wlp1s0b1: Auto connect disabled: do not try to re-connect
wlp1s0b1: Radio work 'sme-connect'@0x16a4ad0 done in 24.227999 seconds
wlp1s0b1: Ignore connection failure indication since interface has been put into disconnected state
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Disconnect event - remove keys
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1
nl80211: Delete station 00:3a:99:d2:64:92
nl80211: Event message available
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:99:d2:64:92 A2=74:2f:68:d2:b1:f3
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 99 d2 64 92 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 00 03 00
nl80211: Deauthenticate event
nl80211: Ignore deauth event triggered due to own deauth request
nl80211: Event message available
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1
nl80211: Ignore disconnect event when using userspace SME
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=0
* type=1
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=1
* type=0
* alpha2=BY
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=BY (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 80 MHz 20 mBm
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS)
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS)
nl80211: Added 802.11b mode based on 802.11g information
EAPOL: disable timer tick
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv]
properties_get_or_set: Set(ApScan)
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
wpa_dbus_dict_open_read: start reading a dict entry
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
proactive_key_caching=1 (0x1)
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate
ENGINE: engine deinit
wpa_dbus_dict_get_entry: dict entry key: password
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=6): [REMOVED]
password - hexdump_ascii(len=6): [REMOVED]
wpa_dbus_dict_get_entry: dict entry key: phase1
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase1 - hexdump_ascii(len=9):
70 65 61 70 76 65 72 3d 30 peapver=0
wpa_dbus_dict_get_entry: dict entry key: eap
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
wpa_dbus_dict_get_entry: dict entry key: phase2
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
wpa_dbus_dict_get_entry: dict entry key: ca_path
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: ssid
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=7): [REMOVED]
ssid - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wpa_dbus_dict_get_entry: dict entry key: key_mgmt
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
key_mgmt: 0x1
wpa_dbus_dict_get_entry: dict entry key: identity
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=12): [REMOVED]
identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED
wpa_dbus_dict_get_entry: dict entry key: scan_ssid
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
scan_ssid=1 (0x1)
wpa_dbus_dict_get_entry: dict entry key: fragment_size
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266
fragment_size=1266 (0x4f2)
wpa_dbus_dict_get_entry: dict entry key: ca_path2
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path2 - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: bgscan
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=17): [REMOVED]
bgscan - hexdump_ascii(len=17):
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30
30 0
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
Fast associate: Old scan results
wlp1s0b1: Setting scan request: 0.000000 sec
wlp1s0b1: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x16a4b30
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16a4b30 after 0.000016 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000059 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.666654 seconds
nl80211: Received scan results (10 BSSes)
wlp1s0b1: BSS: Start scan result update 41
wlp1s0b1: BSS: Add new id 28 BSSID 50:17:ff:dc:2b:40 SSID 'BELTELECOM' freq 2412
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/28'
BSS: last_scan_res_used=10/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16a4b30 done in 0.667980 seconds
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-47 freq=2462
wlp1s0b1: skip - blacklisted (count=2 limit=0)
wlp1s0b1: 1: 00:3a:98:f5:8c:f1 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-59 freq=2462
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 2: 00:3a:99:d2:64:92 ssid='eduroam' wpa_ie_len=32 rsn_ie_len=28 caps=0x431 level=-70 freq=2412
wlp1s0b1: selected based on RSN IE
wlp1s0b1: selected BSS 00:3a:99:d2:64:92 ssid='eduroam'
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:99:d2:64:92 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16abcf0 current_ssid=0x16abcf0
wlp1s0b1: Request association with 00:3a:99:d2:64:92
wlp1s0b1: Re-association to the same ESS
wlp1s0b1: Add radio work 'sme-connect'@0x16a4b30
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'sme-connect'@0x16a4b30 after 0.000032 second wait
wlp1s0b1: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=0x16abcf0 try_opportunistic=1
RSN: Search for BSSID 00:3a:99:d2:64:92
RSN: Consider 00:3a:99:d2:64:92 for OKC
RSN: No PMKSA cache entry found
wlp1s0b1: RSN: using IEEE 802.11i/D9.0
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2
wlp1s0b1: WPA: Selected mgmt group cipher 32
WPA: set AP WPA IE - hexdump(len=34): dd 20 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 02 00 00 50 f2 01 00 40 96 00 00 00
WPA: set AP RSN IE - hexdump(len=30): 30 1c 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 02 00 00 0f ac 01 00 40 96 00 28 00
wlp1s0b1: WPA: using GTK TKIP
wlp1s0b1: WPA: using PTK CCMP
wlp1s0b1: WPA: using KEY_MGMT 802.1X
wlp1s0b1: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp1s0b1: Cancelling scan request
wlp1s0b1: SME: Trying to authenticate with 00:3a:99:d2:64:92 (SSID='eduroam' freq=2412 MHz)
wlp1s0b1: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlp1s0b1: Determining shared radio frequencies (max len 1)
wlp1s0b1: Shared frequencies (len=0): completed iteration
nl80211: Authenticate (ifindex=2)
* bssid=00:3a:99:d2:64:92
* freq=2412
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1
nl80211: New station 00:3a:99:d2:64:92
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/26
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:d2:64:92
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 3a 99 d2 64 92 30 dd 00 00 02 00 00 00
nl80211: Authenticate event
wlp1s0b1: Event AUTH (11) received
wlp1s0b1: SME: Authentication response: peer=00:3a:99:d2:64:92 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp1s0b1: set_disable_max_amsdu: -1
wlp1s0b1: set_ampdu_factor: -1
wlp1s0b1: set_ampdu_density: -1
wlp1s0b1: set_disable_ht40: 0
wlp1s0b1: set_disable_sgi: 0
wlp1s0b1: set_disable_ldpc: 0
wlp1s0b1: Trying to associate with 00:3a:99:d2:64:92 (SSID='eduroam' freq=2412 MHz)
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
nl80211: Associate (ifindex=2)
* bssid=00:3a:99:d2:64:92
* freq=2412
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac02
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:d2:64:92
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 3a 99 d2 64 92 50 dd 31 04 00 00 05 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
nl80211: Associate event
wlp1s0b1: Event ASSOC (0) received
wlp1s0b1: Association info event
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
wlp1s0b1: freq=2412 MHz
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:99:d2:64:92
wlp1s0b1: Associated with 00:3a:99:d2:64:92
wlp1s0b1: WPA: Association event - clear replay counter
wlp1s0b1: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec
wlp1s0b1: Cancelling scan request
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
nl80211: Event message available
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1
nl80211: Ignore connect event (cmd=46) when using userspace SME
l2_packet_receive: src=00:3a:99:d2:64:92 len=50
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c 70 6f 72 74 69 64 3d 32 39
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=41):
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c am,nasid=WiFi-A,
70 6f 72 74 69 64 3d 32 39 portid=29
EAP: using real identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:99:d2:64:92
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41
EAPOL: SUPP_BE entering state RECEIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=3
* type=0
* alpha2=RU
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=RU (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 40 MHz 20 mBm
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS)
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS)
nl80211: 5735-5835 @ 40 MHz 30 mBm
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
l2_packet_receive: src=00:3a:99:d2:64:92 len=10
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Status notification: accept proposed method (param=PEAP)
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
EAP-PEAP: Forced PEAP version 0
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
TLS: Trusted root certificate(s) loaded
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=0)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
OpenSSL: TX ver=0x303 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x303 content_type=22
OpenSSL: Message - hexdump(len=298): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv2/v3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv2/v3 read server hello A
SSL: SSL_connect - want more data
SSL: 303 bytes pending from ssl_out
SSL: 303 bytes left to be sent out (of total 303 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x16a9840
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:99:d2:64:92
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 dd 3d 5a 99 35 f2 59 32 e8 af a4 cc 42 1f a5 b2 56 4d ed 92 7b e6 aa 91 84 2e 8e d0 c7 ff dc c9 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:99:d2:64:92 len=8
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: Status notification: completion (param=failure)
EAP: EAP entering state FAILURE
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:3a:99:d2:64:92
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed - result=FAILURE
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/28) [s]
EAPOL: startWhen --> 0
wlp1s0b1: Authentication with 00:3a:99:d2:64:92 timed out.
Added BSSID 00:3a:99:d2:64:92 into blacklist
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Request to deauthenticate - bssid=00:3a:99:d2:64:92 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED
TDLS: Tear down peers
wpa_driver_nl80211_deauthenticate(addr=00:3a:99:d2:64:92 reason_code=3)
wlp1s0b1: Event DEAUTH (12) received
wlp1s0b1: Deauthentication notification
wlp1s0b1: * reason 3 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:99:d2:64:92 reason=3 locally_generated=1
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6)
wlp1s0b1: Setting scan request: 0.100000 sec
wlp1s0b1: Radio work 'sme-connect'@0x16a4b30 done in 2.059083 seconds
BSSID 00:3a:99:d2:64:92 blacklist count incremented to 2
Continuous association failures - consider temporary network disabling
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=2 duration=32 reason=CONN_FAILED
wlp1s0b1: Blacklist count 10 --> request scan in 10000 ms
wlp1s0b1: Ignore new scan request for 10.000000 sec since an earlier request is scheduled to trigger sooner
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Disconnect event - remove keys
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1
nl80211: Delete station 00:3a:99:d2:64:92
nl80211: Event message available
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:99:d2:64:92 A2=74:2f:68:d2:b1:f3
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 99 d2 64 92 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 00 03 00
nl80211: Deauthenticate event
nl80211: Ignore deauth event triggered due to own deauth request
nl80211: Event message available
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1
nl80211: Ignore disconnect event when using userspace SME
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=0
* type=1
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=1
* type=0
* alpha2=BY
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=BY (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 80 MHz 20 mBm
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS)
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS)
nl80211: Added 802.11b mode based on 802.11g information
wlp1s0b1: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x16a9a70
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16a9a70 after 0.000019 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000057 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.660908 seconds
nl80211: Received scan results (10 BSSes)
wlp1s0b1: BSS: Start scan result update 42
wlp1s0b1: BSS: Remove id 27 BSSID 0a:27:22:d5:d3:50 SSID 'bspu public' due to no match in scan
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/27'
BSS: last_scan_res_used=10/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP 00:18:e7:fa:7b:45 type 0 added
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP 1c:7e:e5:3e:ad:38 type 0 added
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16a9a70 done in 0.662082 seconds
wlp1s0b1: Postpone network selection by 31 seconds since all networks are disabled
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/26
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/28
EAPOL: disable timer tick
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv]
properties_get_or_set: Set(ApScan)
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
wpa_dbus_dict_open_read: start reading a dict entry
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
proactive_key_caching=1 (0x1)
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate
ENGINE: engine deinit
wpa_dbus_dict_get_entry: dict entry key: password
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=6): [REMOVED]
password - hexdump_ascii(len=6): [REMOVED]
wpa_dbus_dict_get_entry: dict entry key: phase1
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase1 - hexdump_ascii(len=9):
70 65 61 70 76 65 72 3d 30 peapver=0
wpa_dbus_dict_get_entry: dict entry key: eap
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
wpa_dbus_dict_get_entry: dict entry key: phase2
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
wpa_dbus_dict_get_entry: dict entry key: ca_path
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: ssid
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=7): [REMOVED]
ssid - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wpa_dbus_dict_get_entry: dict entry key: key_mgmt
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
key_mgmt: 0x1
wpa_dbus_dict_get_entry: dict entry key: identity
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=12): [REMOVED]
identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED
wpa_dbus_dict_get_entry: dict entry key: scan_ssid
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
scan_ssid=1 (0x1)
wpa_dbus_dict_get_entry: dict entry key: fragment_size
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266
fragment_size=1266 (0x4f2)
wpa_dbus_dict_get_entry: dict entry key: ca_path2
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path2 - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: bgscan
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=17): [REMOVED]
bgscan - hexdump_ascii(len=17):
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30
30 0
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
Fast associate: Old scan results
wlp1s0b1: Setting scan request: 0.000000 sec
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x16ac150
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x16ac150 after 0.000015 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000053 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.660849 seconds
nl80211: Received scan results (10 BSSes)
wlp1s0b1: BSS: Start scan result update 43
BSS: last_scan_res_used=10/32
wlp1s0b1: New scan results available (own=1 ext=0)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: Unknown Vendor Extension (Vendor ID 9442)
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp1s0b1: Radio work 'scan'@0x16ac150 done in 0.661840 seconds
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-42 freq=2462
wlp1s0b1: skip - blacklisted (count=2 limit=0)
wlp1s0b1: 1: 00:3a:98:f5:8c:f1 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-43 freq=2462
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 2: 00:18:e7:fa:7b:45 ssid='256A' wpa_ie_len=26 rsn_ie_len=24 caps=0x431 level=-77 freq=2417 wps
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 3: 00:3a:99:d2:64:92 ssid='eduroam' wpa_ie_len=32 rsn_ie_len=28 caps=0x431 level=-79 freq=2412
wlp1s0b1: skip - blacklisted (count=2 limit=0)
wlp1s0b1: 4: 28:cf:da:00:f2:f1 ssid='Point' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-80 freq=2462
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 5: 1c:7e:e5:3e:ad:38 ssid='PMS-WiFi' wpa_ie_len=26 rsn_ie_len=24 caps=0x431 level=-81 freq=2412 wps
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 6: 00:3a:9a:00:7c:42 ssid='eduroam' wpa_ie_len=32 rsn_ie_len=28 caps=0x431 level=-81 freq=2437
wlp1s0b1: selected based on RSN IE
wlp1s0b1: selected BSS 00:3a:9a:00:7c:42 ssid='eduroam'
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:9a:00:7c:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16abab0 current_ssid=0x16abab0
wlp1s0b1: Request association with 00:3a:9a:00:7c:42
wlp1s0b1: Add radio work 'sme-connect'@0x16ac150
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'sme-connect'@0x16ac150 after 0.000025 second wait
wlp1s0b1: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=0x16abab0 try_opportunistic=1
RSN: Search for BSSID 00:3a:9a:00:7c:42
RSN: Consider 00:3a:9a:00:7c:42 for OKC
RSN: No PMKSA cache entry found
wlp1s0b1: RSN: using IEEE 802.11i/D9.0
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2
wlp1s0b1: WPA: Selected mgmt group cipher 32
WPA: set AP WPA IE - hexdump(len=34): dd 20 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 02 00 00 50 f2 01 00 40 96 00 00 00
WPA: set AP RSN IE - hexdump(len=30): 30 1c 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 02 00 00 0f ac 01 00 40 96 00 28 00
wlp1s0b1: WPA: using GTK TKIP
wlp1s0b1: WPA: using PTK CCMP
wlp1s0b1: WPA: using KEY_MGMT 802.1X
wlp1s0b1: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp1s0b1: Cancelling scan request
wlp1s0b1: SME: Trying to authenticate with 00:3a:9a:00:7c:42 (SSID='eduroam' freq=2437 MHz)
wlp1s0b1: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlp1s0b1: Determining shared radio frequencies (max len 1)
wlp1s0b1: Shared frequencies (len=0): completed iteration
nl80211: Authenticate (ifindex=2)
* bssid=00:3a:9a:00:7c:42
* freq=2437
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1
nl80211: New station 00:3a:9a:00:7c:42
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/26
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/28
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:9a:00:7c:42
nl80211: MLME event frame - hexdump(len=30): b0 08 3a 01 74 2f 68 d2 b1 f3 00 3a 9a 00 7c 42 00 3a 9a 00 7c 42 70 35 00 00 02 00 00 00
nl80211: Authenticate event
wlp1s0b1: Event AUTH (11) received
wlp1s0b1: SME: Authentication response: peer=00:3a:9a:00:7c:42 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp1s0b1: set_disable_max_amsdu: -1
wlp1s0b1: set_ampdu_factor: -1
wlp1s0b1: set_ampdu_density: -1
wlp1s0b1: set_disable_ht40: 0
wlp1s0b1: set_disable_sgi: 0
wlp1s0b1: set_disable_ldpc: 0
wlp1s0b1: Trying to associate with 00:3a:9a:00:7c:42 (SSID='eduroam' freq=2437 MHz)
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
nl80211: Associate (ifindex=2)
* bssid=00:3a:9a:00:7c:42
* freq=2437
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac02
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:9a:00:7c:42
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 9a 00 7c 42 00 3a 9a 00 7c 42 80 35 31 04 00 00 03 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
nl80211: Associate event
wlp1s0b1: Event ASSOC (0) received
wlp1s0b1: Association info event
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
wlp1s0b1: freq=2437 MHz
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:9a:00:7c:42
wlp1s0b1: Associated with 00:3a:9a:00:7c:42
wlp1s0b1: WPA: Association event - clear replay counter
wlp1s0b1: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec
wlp1s0b1: Cancelling scan request
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1
nl80211: Ignore connect event (cmd=46) when using userspace SME
l2_packet_receive: src=00:3a:9a:00:7c:42 len=50
wlp1s0b1: RX EAPOL from 00:3a:9a:00:7c:42
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c 70 6f 72 74 69 64 3d 32 39
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=41):
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c am,nasid=WiFi-A,
70 6f 72 74 69 64 3d 32 39 portid=29
EAP: using real identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:9a:00:7c:42
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41
EAPOL: SUPP_BE entering state RECEIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=3
* type=0
* alpha2=RU
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=RU (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 40 MHz 20 mBm
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS)
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS)
nl80211: 5735-5835 @ 40 MHz 30 mBm
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
l2_packet_receive: src=00:3a:9a:00:7c:42 len=10
wlp1s0b1: RX EAPOL from 00:3a:9a:00:7c:42
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Status notification: accept proposed method (param=PEAP)
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
EAP-PEAP: Forced PEAP version 0
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
TLS: Trusted root certificate(s) loaded
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=0)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
OpenSSL: TX ver=0x303 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x303 content_type=22
OpenSSL: Message - hexdump(len=298): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv2/v3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv2/v3 read server hello A
SSL: SSL_connect - want more data
SSL: 303 bytes pending from ssl_out
SSL: 303 bytes left to be sent out (of total 303 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x16a9840
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:9a:00:7c:42
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 3e cc 3e 14 40 ac e7 72 20 9f 51 43 0b 23 24 9b 24 61 f7 2b e4 ee 09 96 f0 f0 1e 52 9c 7b 57 6f 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:9a:00:7c:42 len=8
wlp1s0b1: RX EAPOL from 00:3a:9a:00:7c:42
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: Status notification: completion (param=failure)
EAP: EAP entering state FAILURE
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:3a:9a:00:7c:42
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed - result=FAILURE
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec
wlp1s0b1: Removing interface wlp1s0b1
wlp1s0b1: Request to deauthenticate - bssid=00:3a:9a:00:7c:42 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED
TDLS: Tear down peers
wpa_driver_nl80211_deauthenticate(addr=00:3a:9a:00:7c:42 reason_code=3)
wlp1s0b1: Event DEAUTH (12) received
wlp1s0b1: Deauthentication notification
wlp1s0b1: * reason 3 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:9a:00:7c:42 reason=3 locally_generated=1
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED
wlp1s0b1: Auto connect disabled: do not try to re-connect
wlp1s0b1: Radio work 'sme-connect'@0x16ac150 done in 1.875843 seconds
wlp1s0b1: Ignore connection failure indication since interface has been put into disconnected state
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Disconnect event - remove keys
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit
ENGINE: engine deinit
wlp1s0b1: WPA: Clear old PMK and PTK
Removed BSSID 00:3a:99:d2:64:92 from blacklist (clear)
Removed BSSID 00:3a:98:f5:8c:f0 from blacklist (clear)
wlp1s0b1: BSS: Remove id 0 BSSID 00:3a:98:f5:8c:f0 SSID 'eduroam' due to wpa_bss_flush
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0'
wlp1s0b1: BSS: Remove id 1 BSSID 00:3a:98:f5:8c:f1 SSID 'test' due to wpa_bss_flush
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1'
wlp1s0b1: BSS: Remove id 5 BSSID 00:18:e7:fa:7b:45 SSID '256A' due to wpa_bss_flush
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5'
wlp1s0b1: BSS: Remove id 2 BSSID 00:3a:99:d2:64:92 SSID 'eduroam' due to wpa_bss_flush
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2'
wlp1s0b1: BSS: Remove id 16 BSSID 28:cf:da:00:f2:f1 SSID 'Point' due to wpa_bss_flush
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16'
wlp1s0b1: BSS: Remove id 4 BSSID 1c:7e:e5:3e:ad:38 SSID 'PMS-WiFi' due to wpa_bss_flush
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4'
wlp1s0b1: BSS: Remove id 26 BSSID 00:3a:9a:00:7c:42 SSID 'eduroam' due to wpa_bss_flush
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/26'
wlp1s0b1: BSS: Remove id 6 BSSID 00:3a:98:f5:8c:f2 SSID 'BSU-Conference' due to wpa_bss_flush
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6'
wlp1s0b1: BSS: Remove id 7 BSSID 00:3a:99:d2:64:90 SSID 'BSU-Conference' due to wpa_bss_flush
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7'
wlp1s0b1: BSS: Remove id 28 BSSID 50:17:ff:dc:2b:40 SSID 'BELTELECOM' due to wpa_bss_flush
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/28'
wlp1s0b1: Cancelling scan request
wlp1s0b1: Cancelling authentication timeout
Remove interface wlp1s0b1 from radio phy0
Remove radio phy0
nl80211: deinit ifname=wlp1s0b1 disabled_11b_rates=0
nl80211: Remove monitor interface: refcount=0
netlink: Operstate: ifindex=2 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
nl80211: Set mode ifindex 2 iftype 2 (STATION)
nl80211: Unsubscribe mgmt frames handle 0x8888888889e095f9 (mode change)
dbus: Unregister interface object '/fi/w1/wpa_supplicant1/Interfaces/1'
wlp1s0b1: CTRL-EVENT-TERMINATING
dbus: Unregister D-Bus object '/fi/w1/wpa_supplicant1'
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment