Created
April 20, 2016 09:38
-
-
Save anonymous/8d14c3945386720985e918f5ce726a69 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
wpa_supplicant v2.5 | |
dbus: Register D-Bus object '/fi/w1/wpa_supplicant1' | |
Providing DBus service 'fi.w1.wpa_supplicant1'. | |
Providing DBus service 'fi.epitest.hostap.WPASupplicant'. | |
Successfully initialized wpa_supplicant | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1) [s] | |
dbus: fi.w1.wpa_supplicant1.CreateInterface (/fi/w1/wpa_supplicant1) [a{sv}] | |
wpa_dbus_dict_open_read: start reading a dict entry | |
wpa_dbus_dict_get_entry: dict entry key: Driver | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
wpa_dbus_dict_get_entry: dict entry key: Ifname | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
Initializing interface 'wlp1s0b1' conf 'N/A' driver 'nl80211,wext' ctrl_interface 'N/A' bridge 'N/A' | |
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0 | |
rfkill: initial event: idx=2 type=1 op=0 soft=0 hard=0 | |
rfkill: initial event: idx=3 type=2 op=0 soft=0 hard=0 | |
rfkill: initial event: idx=10 type=2 op=0 soft=0 hard=0 | |
nl80211: Supported cipher 00-0f-ac:1 | |
nl80211: Supported cipher 00-0f-ac:5 | |
nl80211: Supported cipher 00-0f-ac:2 | |
nl80211: Supported cipher 00-0f-ac:4 | |
nl80211: Supported cipher 00-0f-ac:10 | |
nl80211: Supported cipher 00-0f-ac:8 | |
nl80211: Supported cipher 00-0f-ac:9 | |
nl80211: Using driver-based off-channel TX | |
nl80211: interface wlp1s0b1 in phy phy0 | |
nl80211: Set mode ifindex 2 iftype 2 (STATION) | |
nl80211: Subscribe to mgmt frames with non-AP handle 0x1681d70 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=040a | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=040b | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=040c | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=040d | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=090a | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=090b | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=090c | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=090d | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=0409506f9a09 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=7f506f9a09 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=0801 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=06 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=0a07 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=0a11 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=1101 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=1102 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1681d70 match=0505 | |
netlink: Operstate: ifindex=2 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT) | |
nl80211: driver param='(null)' | |
Add interface wlp1s0b1 to a new radio phy0 | |
nl80211: Regulatory information - country=BY (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 80 MHz 20 mBm | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) | |
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS) | |
nl80211: Added 802.11b mode based on 802.11g information | |
wlp1s0b1: Own MAC address: 74:2f:68:d2:b1:f3 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 | |
wlp1s0b1: RSN: flushing PMKID list in the driver | |
nl80211: Flush PMKIDs | |
wlp1s0b1: State: DISCONNECTED -> INACTIVE | |
TDLS: TDLS operation not supported by driver | |
TDLS: Driver uses internal link setup | |
TDLS: Driver does not support TDLS channel switching | |
wlp1s0b1: WPS: UUID based on MAC address: e909a86f-b1a7-5277-89e0-0bfd7fd694fd | |
ENGINE: Loading dynamic engine | |
ENGINE: Loading dynamic engine | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: KEY_RX entering state NO_KEY_RECEIVE | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
dbus: Register interface object '/fi/w1/wpa_supplicant1/Interfaces/1' | |
wlp1s0b1: Added interface wlp1s0b1 | |
wlp1s0b1: State: INACTIVE -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1) [s] | |
dbus: fi.w1.wpa_supplicant1.Interface.NetworkReply (/fi/w1/wpa_supplicant1/Interfaces/1) [oss] | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16844d0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16844d0 after 0.000092 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 10 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000061 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.659885 seconds | |
nl80211: Received scan results (8 BSSes) | |
wlp1s0b1: BSS: Start scan result update 1 | |
wlp1s0b1: BSS: Add new id 0 BSSID 00:3a:98:f5:8c:f0 SSID 'eduroam' freq 2462 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0' | |
wlp1s0b1: BSS: Add new id 1 BSSID 00:3a:98:f5:8c:f1 SSID 'test' freq 2462 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1' | |
wlp1s0b1: BSS: Add new id 2 BSSID 00:3a:99:d2:64:92 SSID 'eduroam' freq 2412 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2' | |
wlp1s0b1: BSS: Add new id 3 BSSID 28:cf:da:00:f2:f1 SSID 'Point' freq 2462 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3' | |
wlp1s0b1: BSS: Add new id 4 BSSID 1c:7e:e5:3e:ad:38 SSID 'PMS-WiFi' freq 2412 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4' | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
wlp1s0b1: BSS: Add new id 5 BSSID 00:18:e7:fa:7b:45 SSID '256A' freq 2417 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5' | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
wlp1s0b1: BSS: Add new id 6 BSSID 00:3a:98:f5:8c:f2 SSID 'BSU-Conference' freq 2462 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6' | |
wlp1s0b1: BSS: Add new id 7 BSSID 00:3a:99:d2:64:90 SSID 'BSU-Conference' freq 2412 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7' | |
BSS: last_scan_res_used=8/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP 1c:7e:e5:3e:ad:38 type 0 added | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP 00:18:e7:fa:7b:45 type 0 added | |
WPS: AP[0] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16844d0 done in 0.667003 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: DISCONNECTED -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0) [s] | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1) [s] | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2) [s] | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3) [s] | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4) [s] | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5) [s] | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6) [s] | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7) [s] | |
EAPOL: disable timer tick | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x1681dc0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x1681dc0 after 0.000160 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000053 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.662028 seconds | |
nl80211: Received scan results (8 BSSes) | |
wlp1s0b1: BSS: Start scan result update 2 | |
BSS: last_scan_res_used=8/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x1681dc0 done in 0.663015 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv] | |
properties_get_or_set: Set(ApScan) | |
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
wpa_dbus_dict_open_read: start reading a dict entry | |
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
proactive_key_caching=1 (0x1) | |
wpa_dbus_dict_get_entry: dict entry key: password | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=6): [REMOVED] | |
password - hexdump_ascii(len=6): [REMOVED] | |
wpa_dbus_dict_get_entry: dict entry key: phase1 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase1 - hexdump_ascii(len=9): | |
70 65 61 70 76 65 72 3d 30 peapver=0 | |
wpa_dbus_dict_get_entry: dict entry key: eap | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 | |
wpa_dbus_dict_get_entry: dict entry key: phase2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase2 - hexdump_ascii(len=13): | |
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 | |
wpa_dbus_dict_get_entry: dict entry key: ca_path | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=7): [REMOVED] | |
ssid - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wpa_dbus_dict_get_entry: dict entry key: key_mgmt | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
key_mgmt: 0x1 | |
wpa_dbus_dict_get_entry: dict entry key: identity | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=12): [REMOVED] | |
identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED | |
wpa_dbus_dict_get_entry: dict entry key: scan_ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
scan_ssid=1 (0x1) | |
wpa_dbus_dict_get_entry: dict entry key: fragment_size | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266 | |
fragment_size=1266 (0x4f2) | |
wpa_dbus_dict_get_entry: dict entry key: ca_path2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path2 - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: bgscan | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=17): [REMOVED] | |
bgscan - hexdump_ascii(len=17): | |
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30 | |
30 0 | |
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
Fast associate: Old scan results | |
wlp1s0b1: Setting scan request: 0.000000 sec | |
wlp1s0b1: State: INACTIVE -> SCANNING | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x16a5200 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16a5200 after 0.000019 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000074 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.661622 seconds | |
nl80211: Received scan results (8 BSSes) | |
wlp1s0b1: BSS: Start scan result update 3 | |
BSS: last_scan_res_used=8/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16a5200 done in 0.662642 seconds | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-41 freq=2462 | |
wlp1s0b1: selected based on RSN IE | |
wlp1s0b1: selected BSS 00:3a:98:f5:8c:f0 ssid='eduroam' | |
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:98:f5:8c:f0 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16abec0 current_ssid=0x16abec0 | |
wlp1s0b1: Request association with 00:3a:98:f5:8c:f0 | |
wlp1s0b1: Add radio work 'sme-connect'@0x16a50b0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'sme-connect'@0x16a50b0 after 0.000028 second wait | |
wlp1s0b1: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=0x16abec0 try_opportunistic=1 | |
RSN: Search for BSSID 00:3a:98:f5:8c:f0 | |
RSN: Consider 00:3a:98:f5:8c:f0 for OKC | |
RSN: No PMKSA cache entry found | |
wlp1s0b1: RSN: using IEEE 802.11i/D9.0 | |
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2 | |
wlp1s0b1: WPA: Selected mgmt group cipher 32 | |
wlp1s0b1: WPA: clearing AP WPA IE | |
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 | |
wlp1s0b1: WPA: using GTK TKIP | |
wlp1s0b1: WPA: using PTK CCMP | |
wlp1s0b1: WPA: using KEY_MGMT 802.1X | |
wlp1s0b1: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:8c:f0 (SSID='eduroam' freq=2462 MHz) | |
wlp1s0b1: State: SCANNING -> AUTHENTICATING | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
wlp1s0b1: Determining shared radio frequencies (max len 1) | |
wlp1s0b1: Shared frequencies (len=0): completed iteration | |
nl80211: Authenticate (ifindex=2) | |
* bssid=00:3a:98:f5:8c:f0 | |
* freq=2462 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1 | |
nl80211: New station 00:3a:98:f5:8c:f0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
nl80211: Event message available | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:8c:f0 | |
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 3a 98 f5 8c f0 c0 67 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp1s0b1: Event AUTH (11) received | |
wlp1s0b1: SME: Authentication response: peer=00:3a:98:f5:8c:f0 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp1s0b1: set_disable_max_amsdu: -1 | |
wlp1s0b1: set_ampdu_factor: -1 | |
wlp1s0b1: set_ampdu_density: -1 | |
wlp1s0b1: set_disable_ht40: 0 | |
wlp1s0b1: set_disable_sgi: 0 | |
wlp1s0b1: set_disable_ldpc: 0 | |
wlp1s0b1: Trying to associate with 00:3a:98:f5:8c:f0 (SSID='eduroam' freq=2462 MHz) | |
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
nl80211: Associate (ifindex=2) | |
* bssid=00:3a:98:f5:8c:f0 | |
* freq=2462 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac02 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:8c:f0 | |
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 3a 98 f5 8c f0 d0 67 31 04 00 00 02 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
nl80211: Associate event | |
wlp1s0b1: Event ASSOC (0) received | |
wlp1s0b1: Association info event | |
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
wlp1s0b1: freq=2462 MHz | |
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:98:f5:8c:f0 | |
wlp1s0b1: Associated with 00:3a:98:f5:8c:f0 | |
wlp1s0b1: WPA: Association event - clear replay counter | |
wlp1s0b1: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: enable timer tick | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec | |
wlp1s0b1: Cancelling scan request | |
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 | |
WMM AC: U-APSD queues=0x0 | |
WMM AC: Valid WMM association, WMM AC is enabled | |
nl80211: Event message available | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=50 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0 | |
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c 70 6f 72 74 69 64 3d 32 39 | |
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_PAE entering state RESTART | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 | |
EAP: EAP entering state IDENTITY | |
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started | |
EAP: Status notification: started (param=) | |
EAP: EAP-Request Identity data - hexdump_ascii(len=41): | |
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro | |
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c am,nasid=WiFi-B, | |
70 6f 72 74 69 64 3d 32 39 portid=29 | |
EAP: using real identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:8c:f0 | |
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41 | |
EAPOL: SUPP_BE entering state RECEIVE | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=3 | |
* type=0 | |
* alpha2=RU | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=RU (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 40 MHz 20 mBm | |
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS) | |
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS) | |
nl80211: 5735-5835 @ 40 MHz 30 mBm | |
nl80211: 57000-66000 @ 2160 MHz 40 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=10 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0 | |
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state GET_METHOD | |
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 | |
EAP: Status notification: accept proposed method (param=PEAP) | |
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) | |
EAP-PEAP: Forced PEAP version 0 | |
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 | |
TLS: using phase1 config options | |
TLS: Trusted root certificate(s) loaded | |
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=6) - Flags 0x20 | |
EAP-PEAP: Start (server ver=0, own ver=0) | |
EAP-PEAP: Using PEAP version 0 | |
SSL: (where=0x10 ret=0x1) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:before/connect initialization | |
OpenSSL: TX ver=0x303 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x303 content_type=22 | |
OpenSSL: Message - hexdump(len=298): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:SSLv2/v3 write client hello A | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in SSLv2/v3 read server hello A | |
SSL: SSL_connect - want more data | |
SSL: 303 bytes pending from ssl_out | |
SSL: 303 bytes left to be sent out (of total 303 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x16ada90 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:8c:f0 | |
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 13 fe f0 f9 19 c7 39 67 05 a0 c8 d3 cf d1 54 de e1 d8 fe ce 97 d4 4b 8f ad 08 15 e5 14 8f dc 97 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=8 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0 | |
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Failure | |
EAP: Status notification: completion (param=failure) | |
EAP: EAP entering state FAILURE | |
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed | |
EAPOL: SUPP_PAE entering state HELD | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Set supplicant port unauthorized for 00:3a:98:f5:8c:f0 | |
EAPOL: SUPP_BE entering state RECEIVE | |
EAPOL: SUPP_BE entering state FAIL | |
EAPOL: SUPP_BE entering state IDLE | |
EAPOL authentication completed - result=FAILURE | |
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec | |
EAPOL: startWhen --> 0 | |
wlp1s0b1: Authentication with 00:3a:98:f5:8c:f0 timed out. | |
Added BSSID 00:3a:98:f5:8c:f0 into blacklist | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Request to deauthenticate - bssid=00:3a:98:f5:8c:f0 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED | |
TDLS: Tear down peers | |
wpa_driver_nl80211_deauthenticate(addr=00:3a:98:f5:8c:f0 reason_code=3) | |
wlp1s0b1: Event DEAUTH (12) received | |
wlp1s0b1: Deauthentication notification | |
wlp1s0b1: * reason 3 (locally generated) | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:98:f5:8c:f0 reason=3 locally_generated=1 | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED | |
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6) | |
wlp1s0b1: Setting scan request: 0.100000 sec | |
wlp1s0b1: Radio work 'sme-connect'@0x16a50b0 done in 2.097770 seconds | |
BSSID 00:3a:98:f5:8c:f0 blacklist count incremented to 2 | |
wlp1s0b1: Blacklist count 2 --> request scan in 500 ms | |
wlp1s0b1: Ignore new scan request for 0.500000 sec since an earlier request is scheduled to trigger sooner | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Disconnect event - remove keys | |
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WMM AC: WMM AC is disabled | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1 | |
nl80211: Delete station 00:3a:98:f5:8c:f0 | |
nl80211: Event message available | |
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:98:f5:8c:f0 A2=74:2f:68:d2:b1:f3 | |
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 98 f5 8c f0 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 00 03 00 | |
nl80211: Deauthenticate event | |
nl80211: Ignore deauth event triggered due to own deauth request | |
nl80211: Event message available | |
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1 | |
nl80211: Ignore disconnect event when using userspace SME | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=0 | |
* type=1 | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=00 | |
nl80211: 2402-2472 @ 40 MHz 20 mBm | |
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR) | |
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) | |
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) | |
nl80211: 57240-63720 @ 2160 MHz 0 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=1 | |
* type=0 | |
* alpha2=BY | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=BY (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 80 MHz 20 mBm | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) | |
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS) | |
nl80211: Added 802.11b mode based on 802.11g information | |
wlp1s0b1: State: DISCONNECTED -> SCANNING | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x16a4ff0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16a4ff0 after 0.000028 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000068 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.660210 seconds | |
nl80211: Received scan results (8 BSSes) | |
wlp1s0b1: BSS: Start scan result update 4 | |
BSS: last_scan_res_used=8/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP 00:18:e7:fa:7b:45 type 0 added | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP 1c:7e:e5:3e:ad:38 type 0 added | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16a4ff0 done in 0.661437 seconds | |
wlp1s0b1: Postpone network selection by 9 seconds since all networks are disabled | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
EAPOL: disable timer tick | |
wlp1s0b1: Try to associate due to network getting re-enabled | |
Fast associate: Old scan results | |
wlp1s0b1: Setting scan request: 0.000000 sec | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x16a4ff0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16a4ff0 after 0.000017 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000058 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.668080 seconds | |
nl80211: Received scan results (8 BSSes) | |
wlp1s0b1: BSS: Start scan result update 5 | |
BSS: last_scan_res_used=8/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16a4ff0 done in 0.669191 seconds | |
wlp1s0b1: CTRL-EVENT-SSID-REENABLED id=0 ssid="eduroam" | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:98:f5:8c:f1 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-42 freq=2462 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 1: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-42 freq=2462 | |
wlp1s0b1: skip - blacklisted (count=2 limit=0) | |
wlp1s0b1: 2: 00:3a:99:d2:64:92 ssid='eduroam' wpa_ie_len=32 rsn_ie_len=28 caps=0x431 level=-74 freq=2412 | |
wlp1s0b1: selected based on RSN IE | |
wlp1s0b1: selected BSS 00:3a:99:d2:64:92 ssid='eduroam' | |
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:99:d2:64:92 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16abec0 current_ssid=(nil) | |
wlp1s0b1: Request association with 00:3a:99:d2:64:92 | |
wlp1s0b1: Re-association to the same ESS | |
wlp1s0b1: Add radio work 'sme-connect'@0x16a4ff0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'sme-connect'@0x16a4ff0 after 0.000027 second wait | |
wlp1s0b1: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=1 | |
RSN: Search for BSSID 00:3a:99:d2:64:92 | |
RSN: Consider 00:3a:99:d2:64:92 for OKC | |
RSN: No PMKSA cache entry found | |
wlp1s0b1: RSN: using IEEE 802.11i/D9.0 | |
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2 | |
wlp1s0b1: WPA: Selected mgmt group cipher 32 | |
WPA: set AP WPA IE - hexdump(len=34): dd 20 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 02 00 00 50 f2 01 00 40 96 00 00 00 | |
WPA: set AP RSN IE - hexdump(len=30): 30 1c 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 02 00 00 0f ac 01 00 40 96 00 28 00 | |
wlp1s0b1: WPA: using GTK TKIP | |
wlp1s0b1: WPA: using PTK CCMP | |
wlp1s0b1: WPA: using KEY_MGMT 802.1X | |
wlp1s0b1: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: SME: Trying to authenticate with 00:3a:99:d2:64:92 (SSID='eduroam' freq=2412 MHz) | |
wlp1s0b1: State: SCANNING -> AUTHENTICATING | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
wlp1s0b1: Determining shared radio frequencies (max len 1) | |
wlp1s0b1: Shared frequencies (len=0): completed iteration | |
nl80211: Authenticate (ifindex=2) | |
* bssid=00:3a:99:d2:64:92 | |
* freq=2412 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1 | |
nl80211: New station 00:3a:99:d2:64:92 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
nl80211: Event message available | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:d2:64:92 | |
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 3a 99 d2 64 92 40 a2 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp1s0b1: Event AUTH (11) received | |
wlp1s0b1: SME: Authentication response: peer=00:3a:99:d2:64:92 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp1s0b1: set_disable_max_amsdu: -1 | |
wlp1s0b1: set_ampdu_factor: -1 | |
wlp1s0b1: set_ampdu_density: -1 | |
wlp1s0b1: set_disable_ht40: 0 | |
wlp1s0b1: set_disable_sgi: 0 | |
wlp1s0b1: set_disable_ldpc: 0 | |
wlp1s0b1: Trying to associate with 00:3a:99:d2:64:92 (SSID='eduroam' freq=2412 MHz) | |
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
nl80211: Associate (ifindex=2) | |
* bssid=00:3a:99:d2:64:92 | |
* freq=2412 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac02 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:d2:64:92 | |
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 3a 99 d2 64 92 60 a2 31 04 00 00 04 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
nl80211: Associate event | |
wlp1s0b1: Event ASSOC (0) received | |
wlp1s0b1: Association info event | |
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
wlp1s0b1: freq=2412 MHz | |
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:99:d2:64:92 | |
wlp1s0b1: Associated with 00:3a:99:d2:64:92 | |
wlp1s0b1: WPA: Association event - clear replay counter | |
wlp1s0b1: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: enable timer tick | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE | |
ENGINE: engine deinit | |
EAP: EAP entering state IDLE | |
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec | |
wlp1s0b1: Cancelling scan request | |
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 | |
WMM AC: U-APSD queues=0x0 | |
WMM AC: Valid WMM association, WMM AC is enabled | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
l2_packet_receive: src=00:3a:99:d2:64:92 len=50 | |
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92 | |
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c 70 6f 72 74 69 64 3d 32 39 | |
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_PAE entering state RESTART | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 | |
EAP: EAP entering state IDENTITY | |
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started | |
EAP: Status notification: started (param=) | |
EAP: EAP-Request Identity data - hexdump_ascii(len=41): | |
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro | |
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c am,nasid=WiFi-A, | |
70 6f 72 74 69 64 3d 32 39 portid=29 | |
EAP: using real identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:99:d2:64:92 | |
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41 | |
EAPOL: SUPP_BE entering state RECEIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
l2_packet_receive: src=00:3a:99:d2:64:92 len=10 | |
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92 | |
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state GET_METHOD | |
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 | |
EAP: Status notification: accept proposed method (param=PEAP) | |
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) | |
EAP-PEAP: Forced PEAP version 0 | |
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 | |
TLS: using phase1 config options | |
TLS: Trusted root certificate(s) loaded | |
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=6) - Flags 0x20 | |
EAP-PEAP: Start (server ver=0, own ver=0) | |
EAP-PEAP: Using PEAP version 0 | |
SSL: (where=0x10 ret=0x1) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:before/connect initialization | |
OpenSSL: TX ver=0x303 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x303 content_type=22 | |
OpenSSL: Message - hexdump(len=298): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:SSLv2/v3 write client hello A | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in SSLv2/v3 read server hello A | |
SSL: SSL_connect - want more data | |
SSL: 303 bytes pending from ssl_out | |
SSL: 303 bytes left to be sent out (of total 303 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x16ad5f0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:99:d2:64:92 | |
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 d4 4e 11 c0 20 6f e8 51 8e a4 18 21 5d 01 74 fd dc 6e cf 0a 38 1d 86 b9 2d ad cd 11 66 bd 9c 0a 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01 | |
EAPOL: SUPP_BE entering state RECEIVE | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=3 | |
* type=0 | |
* alpha2=RU | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=RU (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 40 MHz 20 mBm | |
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS) | |
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS) | |
nl80211: 5735-5835 @ 40 MHz 30 mBm | |
nl80211: 57000-66000 @ 2160 MHz 40 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
l2_packet_receive: src=00:3a:99:d2:64:92 len=8 | |
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92 | |
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Failure | |
EAP: Status notification: completion (param=failure) | |
EAP: EAP entering state FAILURE | |
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed | |
EAPOL: SUPP_PAE entering state HELD | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Set supplicant port unauthorized for 00:3a:99:d2:64:92 | |
EAPOL: SUPP_BE entering state RECEIVE | |
EAPOL: SUPP_BE entering state FAIL | |
EAPOL: SUPP_BE entering state IDLE | |
EAPOL authentication completed - result=FAILURE | |
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec | |
EAPOL: startWhen --> 0 | |
wlp1s0b1: Authentication with 00:3a:99:d2:64:92 timed out. | |
Added BSSID 00:3a:99:d2:64:92 into blacklist | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Request to deauthenticate - bssid=00:3a:99:d2:64:92 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED | |
TDLS: Tear down peers | |
wpa_driver_nl80211_deauthenticate(addr=00:3a:99:d2:64:92 reason_code=3) | |
wlp1s0b1: Event DEAUTH (12) received | |
wlp1s0b1: Deauthentication notification | |
wlp1s0b1: * reason 3 (locally generated) | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:99:d2:64:92 reason=3 locally_generated=1 | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=2 duration=23 reason=AUTH_FAILED | |
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6) | |
wlp1s0b1: Setting scan request: 0.100000 sec | |
wlp1s0b1: Radio work 'sme-connect'@0x16a4ff0 done in 2.036831 seconds | |
BSSID 00:3a:99:d2:64:92 blacklist count incremented to 2 | |
wlp1s0b1: Blacklist count 2 --> request scan in 500 ms | |
wlp1s0b1: Ignore new scan request for 0.500000 sec since an earlier request is scheduled to trigger sooner | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Disconnect event - remove keys | |
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WMM AC: WMM AC is disabled | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1 | |
nl80211: Delete station 00:3a:99:d2:64:92 | |
nl80211: Event message available | |
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:99:d2:64:92 A2=74:2f:68:d2:b1:f3 | |
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 99 d2 64 92 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 00 03 00 | |
nl80211: Deauthenticate event | |
nl80211: Ignore deauth event triggered due to own deauth request | |
nl80211: Event message available | |
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1 | |
nl80211: Ignore disconnect event when using userspace SME | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=0 | |
* type=1 | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=00 | |
nl80211: 2402-2472 @ 40 MHz 20 mBm | |
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR) | |
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) | |
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) | |
nl80211: 57240-63720 @ 2160 MHz 0 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=1 | |
* type=0 | |
* alpha2=BY | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=BY (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 80 MHz 20 mBm | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) | |
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS) | |
nl80211: Added 802.11b mode based on 802.11g information | |
wlp1s0b1: State: DISCONNECTED -> SCANNING | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x16af100 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16af100 after 0.000021 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000060 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.659816 seconds | |
nl80211: Received scan results (8 BSSes) | |
wlp1s0b1: BSS: Start scan result update 6 | |
BSS: last_scan_res_used=8/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP 00:18:e7:fa:7b:45 type 0 added | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP 1c:7e:e5:3e:ad:38 type 0 added | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16af100 done in 0.660836 seconds | |
wlp1s0b1: Postpone network selection by 23 seconds since all networks are disabled | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
EAPOL: disable timer tick | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv] | |
properties_get_or_set: Set(ApScan) | |
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
wpa_dbus_dict_open_read: start reading a dict entry | |
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
proactive_key_caching=1 (0x1) | |
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate | |
ENGINE: engine deinit | |
wpa_dbus_dict_get_entry: dict entry key: password | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=6): [REMOVED] | |
password - hexdump_ascii(len=6): [REMOVED] | |
wpa_dbus_dict_get_entry: dict entry key: phase1 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase1 - hexdump_ascii(len=9): | |
70 65 61 70 76 65 72 3d 30 peapver=0 | |
wpa_dbus_dict_get_entry: dict entry key: eap | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 | |
wpa_dbus_dict_get_entry: dict entry key: phase2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase2 - hexdump_ascii(len=13): | |
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 | |
wpa_dbus_dict_get_entry: dict entry key: ca_path | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=7): [REMOVED] | |
ssid - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wpa_dbus_dict_get_entry: dict entry key: key_mgmt | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
key_mgmt: 0x1 | |
wpa_dbus_dict_get_entry: dict entry key: identity | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=12): [REMOVED] | |
identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED | |
wpa_dbus_dict_get_entry: dict entry key: scan_ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
scan_ssid=1 (0x1) | |
wpa_dbus_dict_get_entry: dict entry key: fragment_size | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266 | |
fragment_size=1266 (0x4f2) | |
wpa_dbus_dict_get_entry: dict entry key: ca_path2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path2 - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: bgscan | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=17): [REMOVED] | |
bgscan - hexdump_ascii(len=17): | |
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30 | |
30 0 | |
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
Fast associate: Old scan results | |
wlp1s0b1: Setting scan request: 0.000000 sec | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x168b0a0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x168b0a0 after 0.000016 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000059 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.666016 seconds | |
nl80211: Received scan results (9 BSSes) | |
wlp1s0b1: BSS: Start scan result update 7 | |
wlp1s0b1: BSS: Add new id 8 BSSID 50:17:ff:dc:2b:41 SSID 'VELCOM WIFI' freq 2412 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/8' | |
BSS: last_scan_res_used=9/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x168b0a0 done in 0.667315 seconds | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-41 freq=2462 | |
wlp1s0b1: skip - blacklisted (count=2 limit=0) | |
wlp1s0b1: 1: 00:3a:98:f5:8c:f1 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-54 freq=2462 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 2: 00:3a:99:d2:64:92 ssid='eduroam' wpa_ie_len=32 rsn_ie_len=28 caps=0x431 level=-72 freq=2412 | |
wlp1s0b1: skip - blacklisted (count=2 limit=0) | |
wlp1s0b1: 3: 00:18:e7:fa:7b:45 ssid='256A' wpa_ie_len=26 rsn_ie_len=24 caps=0x431 level=-77 freq=2417 wps | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 4: 28:cf:da:00:f2:f1 ssid='Point' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-78 freq=2462 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 5: 50:17:ff:dc:2b:41 ssid='VELCOM WIFI' wpa_ie_len=0 rsn_ie_len=20 caps=0x1431 level=-83 freq=2412 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 6: 1c:7e:e5:3e:ad:38 ssid='PMS-WiFi' wpa_ie_len=26 rsn_ie_len=24 caps=0x431 level=-84 freq=2412 wps | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 7: 00:3a:98:f5:8c:f2 ssid='BSU-Conference' wpa_ie_len=0 rsn_ie_len=0 caps=0x431 level=-54 freq=2462 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 8: 00:3a:99:d2:64:90 ssid='BSU-Conference' wpa_ie_len=0 rsn_ie_len=0 caps=0x431 level=-72 freq=2412 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: No APs found - clear blacklist and try again | |
Removed BSSID 00:3a:99:d2:64:92 from blacklist (clear) | |
Removed BSSID 00:3a:98:f5:8c:f0 from blacklist (clear) | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-41 freq=2462 | |
wlp1s0b1: selected based on RSN IE | |
wlp1s0b1: selected BSS 00:3a:98:f5:8c:f0 ssid='eduroam' | |
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:98:f5:8c:f0 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16ad5f0 current_ssid=0x16ad5f0 | |
wlp1s0b1: Request association with 00:3a:98:f5:8c:f0 | |
wlp1s0b1: Add radio work 'sme-connect'@0x168b0a0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'sme-connect'@0x168b0a0 after 0.000030 second wait | |
wlp1s0b1: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=0x16ad5f0 try_opportunistic=1 | |
RSN: Search for BSSID 00:3a:98:f5:8c:f0 | |
RSN: Consider 00:3a:98:f5:8c:f0 for OKC | |
RSN: No PMKSA cache entry found | |
wlp1s0b1: RSN: using IEEE 802.11i/D9.0 | |
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2 | |
wlp1s0b1: WPA: Selected mgmt group cipher 32 | |
wlp1s0b1: WPA: clearing AP WPA IE | |
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 | |
wlp1s0b1: WPA: using GTK TKIP | |
wlp1s0b1: WPA: using PTK CCMP | |
wlp1s0b1: WPA: using KEY_MGMT 802.1X | |
wlp1s0b1: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:8c:f0 (SSID='eduroam' freq=2462 MHz) | |
wlp1s0b1: State: SCANNING -> AUTHENTICATING | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
wlp1s0b1: Determining shared radio frequencies (max len 1) | |
wlp1s0b1: Shared frequencies (len=0): completed iteration | |
nl80211: Authenticate (ifindex=2) | |
* bssid=00:3a:98:f5:8c:f0 | |
* freq=2462 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1 | |
nl80211: New station 00:3a:98:f5:8c:f0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
nl80211: Event message available | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:8c:f0 | |
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 3a 98 f5 8c f0 80 a5 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp1s0b1: Event AUTH (11) received | |
wlp1s0b1: SME: Authentication response: peer=00:3a:98:f5:8c:f0 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp1s0b1: set_disable_max_amsdu: -1 | |
wlp1s0b1: set_ampdu_factor: -1 | |
wlp1s0b1: set_ampdu_density: -1 | |
wlp1s0b1: set_disable_ht40: 0 | |
wlp1s0b1: set_disable_sgi: 0 | |
wlp1s0b1: set_disable_ldpc: 0 | |
wlp1s0b1: Trying to associate with 00:3a:98:f5:8c:f0 (SSID='eduroam' freq=2462 MHz) | |
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
nl80211: Associate (ifindex=2) | |
* bssid=00:3a:98:f5:8c:f0 | |
* freq=2462 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac02 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:8c:f0 | |
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 3a 98 f5 8c f0 a0 a5 31 04 00 00 02 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
nl80211: Associate event | |
wlp1s0b1: Event ASSOC (0) received | |
wlp1s0b1: Association info event | |
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
wlp1s0b1: freq=2462 MHz | |
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:98:f5:8c:f0 | |
wlp1s0b1: Associated with 00:3a:98:f5:8c:f0 | |
wlp1s0b1: WPA: Association event - clear replay counter | |
wlp1s0b1: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: enable timer tick | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec | |
wlp1s0b1: Cancelling scan request | |
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 | |
WMM AC: U-APSD queues=0x0 | |
WMM AC: Valid WMM association, WMM AC is enabled | |
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=50 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0 | |
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c 70 6f 72 74 69 64 3d 32 39 | |
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_PAE entering state RESTART | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 | |
EAP: EAP entering state IDENTITY | |
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started | |
EAP: Status notification: started (param=) | |
EAP: EAP-Request Identity data - hexdump_ascii(len=41): | |
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro | |
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c am,nasid=WiFi-B, | |
70 6f 72 74 69 64 3d 32 39 portid=29 | |
EAP: using real identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:8c:f0 | |
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41 | |
EAPOL: SUPP_BE entering state RECEIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
nl80211: Event message available | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=3 | |
* type=0 | |
* alpha2=RU | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=RU (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 40 MHz 20 mBm | |
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS) | |
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS) | |
nl80211: 5735-5835 @ 40 MHz 30 mBm | |
nl80211: 57000-66000 @ 2160 MHz 40 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=10 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0 | |
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state GET_METHOD | |
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 | |
EAP: Status notification: accept proposed method (param=PEAP) | |
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) | |
EAP-PEAP: Forced PEAP version 0 | |
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 | |
TLS: using phase1 config options | |
TLS: Trusted root certificate(s) loaded | |
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=6) - Flags 0x20 | |
EAP-PEAP: Start (server ver=0, own ver=0) | |
EAP-PEAP: Using PEAP version 0 | |
SSL: (where=0x10 ret=0x1) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:before/connect initialization | |
OpenSSL: TX ver=0x303 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x303 content_type=22 | |
OpenSSL: Message - hexdump(len=298): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:SSLv2/v3 write client hello A | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in SSLv2/v3 read server hello A | |
SSL: SSL_connect - want more data | |
SSL: 303 bytes pending from ssl_out | |
SSL: 303 bytes left to be sent out (of total 303 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x16ae8c0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:8c:f0 | |
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 d4 f8 36 4a ac 97 68 1c 89 26 f2 f5 0a 12 5e 12 d0 32 d6 8e e8 51 2f 10 c1 fe a7 b7 2a e3 7a 24 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01 | |
EAPOL: SUPP_BE entering state RECEIVE | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/8) [s] | |
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=8 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0 | |
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Failure | |
EAP: Status notification: completion (param=failure) | |
EAP: EAP entering state FAILURE | |
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed | |
EAPOL: SUPP_PAE entering state HELD | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Set supplicant port unauthorized for 00:3a:98:f5:8c:f0 | |
EAPOL: SUPP_BE entering state RECEIVE | |
EAPOL: SUPP_BE entering state FAIL | |
EAPOL: SUPP_BE entering state IDLE | |
EAPOL authentication completed - result=FAILURE | |
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec | |
EAPOL: startWhen --> 0 | |
wlp1s0b1: Authentication with 00:3a:98:f5:8c:f0 timed out. | |
Added BSSID 00:3a:98:f5:8c:f0 into blacklist | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Request to deauthenticate - bssid=00:3a:98:f5:8c:f0 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED | |
TDLS: Tear down peers | |
wpa_driver_nl80211_deauthenticate(addr=00:3a:98:f5:8c:f0 reason_code=3) | |
wlp1s0b1: Event DEAUTH (12) received | |
wlp1s0b1: Deauthentication notification | |
wlp1s0b1: * reason 3 (locally generated) | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:98:f5:8c:f0 reason=3 locally_generated=1 | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED | |
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6) | |
wlp1s0b1: Setting scan request: 0.100000 sec | |
wlp1s0b1: Radio work 'sme-connect'@0x168b0a0 done in 2.065179 seconds | |
BSSID 00:3a:98:f5:8c:f0 blacklist count incremented to 2 | |
Continuous association failures - consider temporary network disabling | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=2 duration=26 reason=CONN_FAILED | |
wlp1s0b1: Blacklist count 4 --> request scan in 5000 ms | |
wlp1s0b1: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Disconnect event - remove keys | |
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WMM AC: WMM AC is disabled | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner | |
nl80211: Event message available | |
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1 | |
nl80211: Delete station 00:3a:98:f5:8c:f0 | |
nl80211: Event message available | |
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:98:f5:8c:f0 A2=74:2f:68:d2:b1:f3 | |
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 98 f5 8c f0 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 00 03 00 | |
nl80211: Deauthenticate event | |
nl80211: Ignore deauth event triggered due to own deauth request | |
nl80211: Event message available | |
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1 | |
nl80211: Ignore disconnect event when using userspace SME | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=0 | |
* type=1 | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=00 | |
nl80211: 2402-2472 @ 40 MHz 20 mBm | |
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR) | |
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) | |
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) | |
nl80211: 57240-63720 @ 2160 MHz 0 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=1 | |
* type=0 | |
* alpha2=BY | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=BY (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 80 MHz 20 mBm | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) | |
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS) | |
nl80211: Added 802.11b mode based on 802.11g information | |
wlp1s0b1: State: DISCONNECTED -> SCANNING | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x16a5160 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16a5160 after 0.000022 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000058 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.659835 seconds | |
nl80211: Received scan results (10 BSSes) | |
wlp1s0b1: BSS: Start scan result update 8 | |
wlp1s0b1: BSS: Add new id 9 BSSID 50:17:ff:dc:2b:40 SSID 'BELTELECOM' freq 2412 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9' | |
BSS: last_scan_res_used=10/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP 00:18:e7:fa:7b:45 type 0 added | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP 1c:7e:e5:3e:ad:38 type 0 added | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16a5160 done in 0.661144 seconds | |
wlp1s0b1: Postpone network selection by 26 seconds since all networks are disabled | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/8 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9) [s] | |
EAPOL: disable timer tick | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
wlp1s0b1: Try to associate due to network getting re-enabled | |
Fast associate: Old scan results | |
wlp1s0b1: Setting scan request: 0.000000 sec | |
wlp1s0b1: No enabled networks - do not scan | |
wlp1s0b1: State: SCANNING -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16844d0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16844d0 after 0.000134 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000058 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.664486 seconds | |
nl80211: Received scan results (10 BSSes) | |
wlp1s0b1: BSS: Start scan result update 9 | |
BSS: last_scan_res_used=10/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16844d0 done in 0.665492 seconds | |
wlp1s0b1: No APs found - clear blacklist and try again | |
Removed BSSID 00:3a:98:f5:8c:f0 from blacklist (clear) | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/8 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9 | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16844d0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16844d0 after 0.000173 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000062 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.661660 seconds | |
nl80211: Received scan results (9 BSSes) | |
wlp1s0b1: BSS: Start scan result update 10 | |
BSS: last_scan_res_used=9/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16844d0 done in 0.662703 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9 | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16844d0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16844d0 after 0.000181 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000059 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.658863 seconds | |
nl80211: Received scan results (9 BSSes) | |
wlp1s0b1: BSS: Start scan result update 11 | |
wlp1s0b1: BSS: Remove id 8 BSSID 50:17:ff:dc:2b:41 SSID 'VELCOM WIFI' due to no match in scan | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/8' | |
BSS: last_scan_res_used=9/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16844d0 done in 0.659923 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9 | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16844d0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16844d0 after 0.000159 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000061 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.664658 seconds | |
nl80211: Received scan results (9 BSSes) | |
wlp1s0b1: BSS: Start scan result update 12 | |
wlp1s0b1: BSS: Add new id 10 BSSID 00:3a:9a:00:7c:42 SSID 'eduroam' freq 2412 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/10' | |
BSS: last_scan_res_used=9/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16844d0 done in 0.665969 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/10) [s] | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16844d0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16844d0 after 0.000162 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000072 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.664184 seconds | |
nl80211: Received scan results (9 BSSes) | |
wlp1s0b1: BSS: Start scan result update 13 | |
BSS: last_scan_res_used=9/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16844d0 done in 0.665282 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9 | |
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv] | |
properties_get_or_set: Set(ApScan) | |
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
wpa_dbus_dict_open_read: start reading a dict entry | |
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
proactive_key_caching=1 (0x1) | |
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate | |
ENGINE: engine deinit | |
wpa_dbus_dict_get_entry: dict entry key: password | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=6): [REMOVED] | |
password - hexdump_ascii(len=6): [REMOVED] | |
wpa_dbus_dict_get_entry: dict entry key: phase1 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase1 - hexdump_ascii(len=9): | |
70 65 61 70 76 65 72 3d 30 peapver=0 | |
wpa_dbus_dict_get_entry: dict entry key: eap | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 | |
wpa_dbus_dict_get_entry: dict entry key: phase2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase2 - hexdump_ascii(len=13): | |
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 | |
wpa_dbus_dict_get_entry: dict entry key: ca_path | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=7): [REMOVED] | |
ssid - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wpa_dbus_dict_get_entry: dict entry key: key_mgmt | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
key_mgmt: 0x1 | |
wpa_dbus_dict_get_entry: dict entry key: identity | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=12): [REMOVED] | |
identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED | |
wpa_dbus_dict_get_entry: dict entry key: scan_ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
scan_ssid=1 (0x1) | |
wpa_dbus_dict_get_entry: dict entry key: fragment_size | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266 | |
fragment_size=1266 (0x4f2) | |
wpa_dbus_dict_get_entry: dict entry key: ca_path2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path2 - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: bgscan | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=17): [REMOVED] | |
bgscan - hexdump_ascii(len=17): | |
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30 | |
30 0 | |
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
Fast associate: Old scan results | |
wlp1s0b1: Setting scan request: 0.000000 sec | |
wlp1s0b1: State: INACTIVE -> SCANNING | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x16aed80 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16aed80 after 0.000020 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000060 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.662824 seconds | |
nl80211: Received scan results (10 BSSes) | |
wlp1s0b1: BSS: Start scan result update 14 | |
BSS: last_scan_res_used=10/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16aed80 done in 0.663872 seconds | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:98:f5:8c:f1 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-38 freq=2462 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 1: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-40 freq=2462 | |
wlp1s0b1: selected based on RSN IE | |
wlp1s0b1: selected BSS 00:3a:98:f5:8c:f0 ssid='eduroam' | |
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:98:f5:8c:f0 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16a6530 current_ssid=0x16a6530 | |
wlp1s0b1: Request association with 00:3a:98:f5:8c:f0 | |
wlp1s0b1: Add radio work 'sme-connect'@0x16aed80 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'sme-connect'@0x16aed80 after 0.000030 second wait | |
wlp1s0b1: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=0x16a6530 try_opportunistic=1 | |
RSN: Search for BSSID 00:3a:98:f5:8c:f0 | |
RSN: Consider 00:3a:98:f5:8c:f0 for OKC | |
RSN: No PMKSA cache entry found | |
wlp1s0b1: RSN: using IEEE 802.11i/D9.0 | |
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2 | |
wlp1s0b1: WPA: Selected mgmt group cipher 32 | |
wlp1s0b1: WPA: clearing AP WPA IE | |
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 | |
wlp1s0b1: WPA: using GTK TKIP | |
wlp1s0b1: WPA: using PTK CCMP | |
wlp1s0b1: WPA: using KEY_MGMT 802.1X | |
wlp1s0b1: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:8c:f0 (SSID='eduroam' freq=2462 MHz) | |
wlp1s0b1: State: SCANNING -> AUTHENTICATING | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
wlp1s0b1: Determining shared radio frequencies (max len 1) | |
wlp1s0b1: Shared frequencies (len=0): completed iteration | |
nl80211: Authenticate (ifindex=2) | |
* bssid=00:3a:98:f5:8c:f0 | |
* freq=2462 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
nl80211: Event message available | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1 | |
nl80211: New station 00:3a:98:f5:8c:f0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
nl80211: Event message available | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:8c:f0 | |
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 3a 98 f5 8c f0 30 d4 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp1s0b1: Event AUTH (11) received | |
wlp1s0b1: SME: Authentication response: peer=00:3a:98:f5:8c:f0 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp1s0b1: set_disable_max_amsdu: -1 | |
wlp1s0b1: set_ampdu_factor: -1 | |
wlp1s0b1: set_ampdu_density: -1 | |
wlp1s0b1: set_disable_ht40: 0 | |
wlp1s0b1: set_disable_sgi: 0 | |
wlp1s0b1: set_disable_ldpc: 0 | |
wlp1s0b1: Trying to associate with 00:3a:98:f5:8c:f0 (SSID='eduroam' freq=2462 MHz) | |
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
nl80211: Associate (ifindex=2) | |
* bssid=00:3a:98:f5:8c:f0 | |
* freq=2462 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac02 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/10 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:8c:f0 | |
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 3a 98 f5 8c f0 40 d4 31 04 00 00 02 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
nl80211: Associate event | |
wlp1s0b1: Event ASSOC (0) received | |
wlp1s0b1: Association info event | |
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
wlp1s0b1: freq=2462 MHz | |
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:98:f5:8c:f0 | |
wlp1s0b1: Associated with 00:3a:98:f5:8c:f0 | |
wlp1s0b1: WPA: Association event - clear replay counter | |
wlp1s0b1: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: enable timer tick | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec | |
wlp1s0b1: Cancelling scan request | |
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 | |
WMM AC: U-APSD queues=0x0 | |
WMM AC: Valid WMM association, WMM AC is enabled | |
nl80211: Event message available | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=50 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0 | |
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c 70 6f 72 74 69 64 3d 32 39 | |
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_PAE entering state RESTART | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 | |
EAP: EAP entering state IDENTITY | |
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started | |
EAP: Status notification: started (param=) | |
EAP: EAP-Request Identity data - hexdump_ascii(len=41): | |
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro | |
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c am,nasid=WiFi-B, | |
70 6f 72 74 69 64 3d 32 39 portid=29 | |
EAP: using real identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:8c:f0 | |
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41 | |
EAPOL: SUPP_BE entering state RECEIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=3 | |
* type=0 | |
* alpha2=RU | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=RU (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 40 MHz 20 mBm | |
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS) | |
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS) | |
nl80211: 5735-5835 @ 40 MHz 30 mBm | |
nl80211: 57000-66000 @ 2160 MHz 40 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=10 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0 | |
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state GET_METHOD | |
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 | |
EAP: Status notification: accept proposed method (param=PEAP) | |
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) | |
EAP-PEAP: Forced PEAP version 0 | |
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 | |
TLS: using phase1 config options | |
TLS: Trusted root certificate(s) loaded | |
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=6) - Flags 0x20 | |
EAP-PEAP: Start (server ver=0, own ver=0) | |
EAP-PEAP: Using PEAP version 0 | |
SSL: (where=0x10 ret=0x1) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:before/connect initialization | |
OpenSSL: TX ver=0x303 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x303 content_type=22 | |
OpenSSL: Message - hexdump(len=298): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:SSLv2/v3 write client hello A | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in SSLv2/v3 read server hello A | |
SSL: SSL_connect - want more data | |
SSL: 303 bytes pending from ssl_out | |
SSL: 303 bytes left to be sent out (of total 303 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x16abf90 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:8c:f0 | |
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 32 8c 2d 3e d1 fb fa 1a be d4 8a d6 d2 72 c1 6a 5c b5 a8 fd 21 c6 44 89 98 3e 90 b1 3a cb ff e1 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=8 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0 | |
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Failure | |
EAP: Status notification: completion (param=failure) | |
EAP: EAP entering state FAILURE | |
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed | |
EAPOL: SUPP_PAE entering state HELD | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Set supplicant port unauthorized for 00:3a:98:f5:8c:f0 | |
EAPOL: SUPP_BE entering state RECEIVE | |
EAPOL: SUPP_BE entering state FAIL | |
EAPOL: SUPP_BE entering state IDLE | |
EAPOL authentication completed - result=FAILURE | |
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec | |
EAPOL: startWhen --> 0 | |
wlp1s0b1: Authentication with 00:3a:98:f5:8c:f0 timed out. | |
Added BSSID 00:3a:98:f5:8c:f0 into blacklist | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Request to deauthenticate - bssid=00:3a:98:f5:8c:f0 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED | |
TDLS: Tear down peers | |
wpa_driver_nl80211_deauthenticate(addr=00:3a:98:f5:8c:f0 reason_code=3) | |
wlp1s0b1: Event DEAUTH (12) received | |
wlp1s0b1: Deauthentication notification | |
wlp1s0b1: * reason 3 (locally generated) | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:98:f5:8c:f0 reason=3 locally_generated=1 | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED | |
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6) | |
wlp1s0b1: Setting scan request: 0.100000 sec | |
wlp1s0b1: Radio work 'sme-connect'@0x16aed80 done in 2.042314 seconds | |
BSSID 00:3a:98:f5:8c:f0 blacklist count incremented to 2 | |
Continuous association failures - consider temporary network disabling | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=2 duration=37 reason=CONN_FAILED | |
wlp1s0b1: Blacklist count 6 --> request scan in 10000 ms | |
wlp1s0b1: Ignore new scan request for 10.000000 sec since an earlier request is scheduled to trigger sooner | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Disconnect event - remove keys | |
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WMM AC: WMM AC is disabled | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1 | |
nl80211: Delete station 00:3a:98:f5:8c:f0 | |
nl80211: Event message available | |
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:98:f5:8c:f0 A2=74:2f:68:d2:b1:f3 | |
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 98 f5 8c f0 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 00 03 00 | |
nl80211: Deauthenticate event | |
nl80211: Ignore deauth event triggered due to own deauth request | |
nl80211: Event message available | |
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1 | |
nl80211: Ignore disconnect event when using userspace SME | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=0 | |
* type=1 | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=00 | |
nl80211: 2402-2472 @ 40 MHz 20 mBm | |
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR) | |
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) | |
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) | |
nl80211: 57240-63720 @ 2160 MHz 0 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=1 | |
* type=0 | |
* alpha2=BY | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=BY (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 80 MHz 20 mBm | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) | |
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS) | |
nl80211: Added 802.11b mode based on 802.11g information | |
wlp1s0b1: State: DISCONNECTED -> SCANNING | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x168af10 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x168af10 after 0.000021 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000059 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.658938 seconds | |
nl80211: Received scan results (10 BSSes) | |
wlp1s0b1: BSS: Start scan result update 15 | |
BSS: last_scan_res_used=10/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP 00:18:e7:fa:7b:45 type 0 added | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP 1c:7e:e5:3e:ad:38 type 0 added | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x168af10 done in 0.660017 seconds | |
wlp1s0b1: Postpone network selection by 36 seconds since all networks are disabled | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/10 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9 | |
EAPOL: disable timer tick | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv] | |
properties_get_or_set: Set(ApScan) | |
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
wpa_dbus_dict_open_read: start reading a dict entry | |
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
proactive_key_caching=1 (0x1) | |
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate | |
ENGINE: engine deinit | |
wpa_dbus_dict_get_entry: dict entry key: password | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=6): [REMOVED] | |
password - hexdump_ascii(len=6): [REMOVED] | |
wpa_dbus_dict_get_entry: dict entry key: phase1 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase1 - hexdump_ascii(len=9): | |
70 65 61 70 76 65 72 3d 30 peapver=0 | |
wpa_dbus_dict_get_entry: dict entry key: eap | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 | |
wpa_dbus_dict_get_entry: dict entry key: phase2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase2 - hexdump_ascii(len=13): | |
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 | |
wpa_dbus_dict_get_entry: dict entry key: ca_path | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=7): [REMOVED] | |
ssid - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wpa_dbus_dict_get_entry: dict entry key: key_mgmt | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
key_mgmt: 0x1 | |
wpa_dbus_dict_get_entry: dict entry key: identity | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=12): [REMOVED] | |
identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED | |
wpa_dbus_dict_get_entry: dict entry key: scan_ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
scan_ssid=1 (0x1) | |
wpa_dbus_dict_get_entry: dict entry key: fragment_size | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266 | |
fragment_size=1266 (0x4f2) | |
wpa_dbus_dict_get_entry: dict entry key: ca_path2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path2 - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: bgscan | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=17): [REMOVED] | |
bgscan - hexdump_ascii(len=17): | |
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30 | |
30 0 | |
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
Fast associate: Old scan results | |
wlp1s0b1: Setting scan request: 0.000000 sec | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x16aeca0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16aeca0 after 0.000018 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000063 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.664326 seconds | |
nl80211: Received scan results (10 BSSes) | |
wlp1s0b1: BSS: Start scan result update 16 | |
BSS: last_scan_res_used=10/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16aeca0 done in 0.665478 seconds | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:98:f5:8c:f1 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-41 freq=2462 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 1: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-41 freq=2462 | |
wlp1s0b1: skip - blacklisted (count=2 limit=0) | |
wlp1s0b1: 2: 00:3a:99:d2:64:92 ssid='eduroam' wpa_ie_len=32 rsn_ie_len=28 caps=0x431 level=-73 freq=2412 | |
wlp1s0b1: selected based on RSN IE | |
wlp1s0b1: selected BSS 00:3a:99:d2:64:92 ssid='eduroam' | |
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:99:d2:64:92 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16ade00 current_ssid=0x16ade00 | |
wlp1s0b1: Request association with 00:3a:99:d2:64:92 | |
wlp1s0b1: Add radio work 'sme-connect'@0x16aeca0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'sme-connect'@0x16aeca0 after 0.000030 second wait | |
wlp1s0b1: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=0x16ade00 try_opportunistic=1 | |
RSN: Search for BSSID 00:3a:99:d2:64:92 | |
RSN: Consider 00:3a:99:d2:64:92 for OKC | |
RSN: No PMKSA cache entry found | |
wlp1s0b1: RSN: using IEEE 802.11i/D9.0 | |
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2 | |
wlp1s0b1: WPA: Selected mgmt group cipher 32 | |
WPA: set AP WPA IE - hexdump(len=34): dd 20 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 02 00 00 50 f2 01 00 40 96 00 00 00 | |
WPA: set AP RSN IE - hexdump(len=30): 30 1c 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 02 00 00 0f ac 01 00 40 96 00 28 00 | |
wlp1s0b1: WPA: using GTK TKIP | |
wlp1s0b1: WPA: using PTK CCMP | |
wlp1s0b1: WPA: using KEY_MGMT 802.1X | |
wlp1s0b1: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: SME: Trying to authenticate with 00:3a:99:d2:64:92 (SSID='eduroam' freq=2412 MHz) | |
wlp1s0b1: State: SCANNING -> AUTHENTICATING | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
wlp1s0b1: Determining shared radio frequencies (max len 1) | |
wlp1s0b1: Shared frequencies (len=0): completed iteration | |
nl80211: Authenticate (ifindex=2) | |
* bssid=00:3a:99:d2:64:92 | |
* freq=2412 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1 | |
nl80211: New station 00:3a:99:d2:64:92 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:d2:64:92 | |
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 3a 99 d2 64 92 60 9f 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp1s0b1: Event AUTH (11) received | |
wlp1s0b1: SME: Authentication response: peer=00:3a:99:d2:64:92 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp1s0b1: set_disable_max_amsdu: -1 | |
wlp1s0b1: set_ampdu_factor: -1 | |
wlp1s0b1: set_ampdu_density: -1 | |
wlp1s0b1: set_disable_ht40: 0 | |
wlp1s0b1: set_disable_sgi: 0 | |
wlp1s0b1: set_disable_ldpc: 0 | |
wlp1s0b1: Trying to associate with 00:3a:99:d2:64:92 (SSID='eduroam' freq=2412 MHz) | |
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
nl80211: Associate (ifindex=2) | |
* bssid=00:3a:99:d2:64:92 | |
* freq=2412 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac02 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/10 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:d2:64:92 | |
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 3a 99 d2 64 92 90 9f 31 04 00 00 05 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
nl80211: Associate event | |
wlp1s0b1: Event ASSOC (0) received | |
wlp1s0b1: Association info event | |
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
wlp1s0b1: freq=2412 MHz | |
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:99:d2:64:92 | |
wlp1s0b1: Associated with 00:3a:99:d2:64:92 | |
wlp1s0b1: WPA: Association event - clear replay counter | |
wlp1s0b1: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: enable timer tick | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec | |
wlp1s0b1: Cancelling scan request | |
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 | |
WMM AC: U-APSD queues=0x0 | |
WMM AC: Valid WMM association, WMM AC is enabled | |
nl80211: Event message available | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
l2_packet_receive: src=00:3a:99:d2:64:92 len=50 | |
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92 | |
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c 70 6f 72 74 69 64 3d 32 39 | |
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_PAE entering state RESTART | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 | |
EAP: EAP entering state IDENTITY | |
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started | |
EAP: Status notification: started (param=) | |
EAP: EAP-Request Identity data - hexdump_ascii(len=41): | |
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro | |
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c am,nasid=WiFi-A, | |
70 6f 72 74 69 64 3d 32 39 portid=29 | |
EAP: using real identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:99:d2:64:92 | |
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41 | |
EAPOL: SUPP_BE entering state RECEIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=3 | |
* type=0 | |
* alpha2=RU | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=RU (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 40 MHz 20 mBm | |
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS) | |
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS) | |
nl80211: 5735-5835 @ 40 MHz 30 mBm | |
nl80211: 57000-66000 @ 2160 MHz 40 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
l2_packet_receive: src=00:3a:99:d2:64:92 len=10 | |
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92 | |
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state GET_METHOD | |
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 | |
EAP: Status notification: accept proposed method (param=PEAP) | |
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) | |
EAP-PEAP: Forced PEAP version 0 | |
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 | |
TLS: using phase1 config options | |
TLS: Trusted root certificate(s) loaded | |
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=6) - Flags 0x20 | |
EAP-PEAP: Start (server ver=0, own ver=0) | |
EAP-PEAP: Using PEAP version 0 | |
SSL: (where=0x10 ret=0x1) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:before/connect initialization | |
OpenSSL: TX ver=0x303 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x303 content_type=22 | |
OpenSSL: Message - hexdump(len=298): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:SSLv2/v3 write client hello A | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in SSLv2/v3 read server hello A | |
SSL: SSL_connect - want more data | |
SSL: 303 bytes pending from ssl_out | |
SSL: 303 bytes left to be sent out (of total 303 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x168aed0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:99:d2:64:92 | |
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 7e 23 81 cd 11 bb b9 94 83 cf 02 51 a4 3a e8 b3 30 92 1a 5c 72 ce e6 94 92 e1 34 71 9d 19 37 6f 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:99:d2:64:92 len=8 | |
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92 | |
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Failure | |
EAP: Status notification: completion (param=failure) | |
EAP: EAP entering state FAILURE | |
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed | |
EAPOL: SUPP_PAE entering state HELD | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Set supplicant port unauthorized for 00:3a:99:d2:64:92 | |
EAPOL: SUPP_BE entering state RECEIVE | |
EAPOL: SUPP_BE entering state FAIL | |
EAPOL: SUPP_BE entering state IDLE | |
EAPOL authentication completed - result=FAILURE | |
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec | |
EAPOL: startWhen --> 0 | |
wlp1s0b1: Authentication with 00:3a:99:d2:64:92 timed out. | |
Added BSSID 00:3a:99:d2:64:92 into blacklist | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Request to deauthenticate - bssid=00:3a:99:d2:64:92 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED | |
TDLS: Tear down peers | |
wpa_driver_nl80211_deauthenticate(addr=00:3a:99:d2:64:92 reason_code=3) | |
wlp1s0b1: Event DEAUTH (12) received | |
wlp1s0b1: Deauthentication notification | |
wlp1s0b1: * reason 3 (locally generated) | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:99:d2:64:92 reason=3 locally_generated=1 | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED | |
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6) | |
wlp1s0b1: Setting scan request: 0.100000 sec | |
wlp1s0b1: Radio work 'sme-connect'@0x16aeca0 done in 2.069717 seconds | |
BSSID 00:3a:99:d2:64:92 blacklist count incremented to 2 | |
Continuous association failures - consider temporary network disabling | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=2 duration=35 reason=CONN_FAILED | |
wlp1s0b1: Blacklist count 6 --> request scan in 10000 ms | |
wlp1s0b1: Ignore new scan request for 10.000000 sec since an earlier request is scheduled to trigger sooner | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Disconnect event - remove keys | |
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WMM AC: WMM AC is disabled | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1 | |
nl80211: Delete station 00:3a:99:d2:64:92 | |
nl80211: Event message available | |
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:99:d2:64:92 A2=74:2f:68:d2:b1:f3 | |
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 99 d2 64 92 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 00 03 00 | |
nl80211: Deauthenticate event | |
nl80211: Ignore deauth event triggered due to own deauth request | |
nl80211: Event message available | |
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1 | |
nl80211: Ignore disconnect event when using userspace SME | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=0 | |
* type=1 | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=00 | |
nl80211: 2402-2472 @ 40 MHz 20 mBm | |
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR) | |
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) | |
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) | |
nl80211: 57240-63720 @ 2160 MHz 0 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=1 | |
* type=0 | |
* alpha2=BY | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=BY (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 80 MHz 20 mBm | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) | |
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS) | |
nl80211: Added 802.11b mode based on 802.11g information | |
wlp1s0b1: State: DISCONNECTED -> SCANNING | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x16aeca0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16aeca0 after 0.000021 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000071 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.658529 seconds | |
nl80211: Received scan results (9 BSSes) | |
wlp1s0b1: BSS: Start scan result update 17 | |
BSS: last_scan_res_used=9/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP 00:18:e7:fa:7b:45 type 0 added | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP 1c:7e:e5:3e:ad:38 type 0 added | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16aeca0 done in 0.659552 seconds | |
wlp1s0b1: Postpone network selection by 35 seconds since all networks are disabled | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9 | |
EAPOL: disable timer tick | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16844d0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16844d0 after 0.000112 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000059 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.674765 seconds | |
nl80211: Received scan results (9 BSSes) | |
wlp1s0b1: BSS: Start scan result update 18 | |
wlp1s0b1: BSS: Remove id 10 BSSID 00:3a:9a:00:7c:42 SSID 'eduroam' due to no match in scan | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/10' | |
BSS: last_scan_res_used=9/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16844d0 done in 0.675928 seconds | |
wlp1s0b1: No APs found - clear blacklist and try again | |
Removed BSSID 00:3a:99:d2:64:92 from blacklist (clear) | |
Removed BSSID 00:3a:98:f5:8c:f0 from blacklist (clear) | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: SCANNING -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9 | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16844d0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16844d0 after 0.000167 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000060 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.665345 seconds | |
nl80211: Received scan results (9 BSSes) | |
wlp1s0b1: BSS: Start scan result update 19 | |
wlp1s0b1: BSS: Add new id 11 BSSID 50:17:ff:dc:2b:41 SSID 'VELCOM WIFI' freq 2412 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/11' | |
BSS: last_scan_res_used=9/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16844d0 done in 0.666646 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/11) [s] | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16844d0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16844d0 after 0.000159 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000060 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.660321 seconds | |
nl80211: Received scan results (11 BSSes) | |
wlp1s0b1: BSS: Start scan result update 20 | |
wlp1s0b1: BSS: Add new id 12 BSSID 12:27:22:d5:d3:50 SSID 'bspu' freq 2437 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/12' | |
BSS: last_scan_res_used=11/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16844d0 done in 0.661696 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/11 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9 | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/12) [s] | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16844d0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16844d0 after 0.000167 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000077 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.658067 seconds | |
nl80211: Received scan results (9 BSSes) | |
wlp1s0b1: BSS: Start scan result update 21 | |
BSS: last_scan_res_used=9/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16844d0 done in 0.659107 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9 | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16ab2d0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16ab2d0 after 0.000166 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000085 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.659024 seconds | |
nl80211: Received scan results (10 BSSes) | |
wlp1s0b1: BSS: Start scan result update 22 | |
wlp1s0b1: BSS: Add new id 13 BSSID 00:3a:9a:00:7c:42 SSID 'eduroam' freq 2437 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/13' | |
wlp1s0b1: BSS: Remove id 11 BSSID 50:17:ff:dc:2b:41 SSID 'VELCOM WIFI' due to no match in scan | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/11' | |
wlp1s0b1: BSS: Remove id 12 BSSID 12:27:22:d5:d3:50 SSID 'bspu' due to no match in scan | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/12' | |
BSS: last_scan_res_used=10/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16ab2d0 done in 0.660485 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9 | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/13) [s] | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16ab2d0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16ab2d0 after 0.000167 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000057 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.659728 seconds | |
nl80211: Received scan results (9 BSSes) | |
wlp1s0b1: BSS: Start scan result update 23 | |
wlp1s0b1: BSS: Add new id 14 BSSID 0a:27:22:d5:d3:50 SSID 'bspu public' freq 2437 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/14' | |
BSS: last_scan_res_used=9/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16ab2d0 done in 0.660932 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/13 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/14) [s] | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16ab2d0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16ab2d0 after 0.000225 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000060 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.658605 seconds | |
nl80211: Received scan results (7 BSSes) | |
wlp1s0b1: BSS: Start scan result update 24 | |
wlp1s0b1: BSS: Add new id 15 BSSID 50:17:ff:dc:2b:41 SSID 'VELCOM WIFI' freq 2412 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/15' | |
wlp1s0b1: BSS: Remove id 3 BSSID 28:cf:da:00:f2:f1 SSID 'Point' due to no match in scan | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3' | |
wlp1s0b1: BSS: Remove id 9 BSSID 50:17:ff:dc:2b:40 SSID 'BELTELECOM' due to no match in scan | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/9' | |
BSS: last_scan_res_used=7/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16ab2d0 done in 0.659887 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/15) [s] | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16ab2d0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16ab2d0 after 0.000170 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000057 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.666001 seconds | |
nl80211: Received scan results (7 BSSes) | |
wlp1s0b1: BSS: Start scan result update 25 | |
wlp1s0b1: BSS: Add new id 16 BSSID 28:cf:da:00:f2:f1 SSID 'Point' freq 2462 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16' | |
wlp1s0b1: BSS: Remove id 13 BSSID 00:3a:9a:00:7c:42 SSID 'eduroam' due to no match in scan | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/13' | |
wlp1s0b1: BSS: Remove id 14 BSSID 0a:27:22:d5:d3:50 SSID 'bspu public' due to no match in scan | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/14' | |
BSS: last_scan_res_used=7/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16ab2d0 done in 0.667359 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16) [s] | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16ab2d0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16ab2d0 after 0.000159 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000059 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.660668 seconds | |
nl80211: Received scan results (11 BSSes) | |
wlp1s0b1: BSS: Start scan result update 26 | |
wlp1s0b1: BSS: Add new id 17 BSSID 00:3a:9a:00:7c:42 SSID 'eduroam' freq 2437 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17' | |
wlp1s0b1: BSS: Add new id 18 BSSID 0e:27:22:d5:d3:50 SSID 'bspu guest' freq 2437 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/18' | |
wlp1s0b1: BSS: Add new id 19 BSSID 50:17:ff:dc:2b:40 SSID 'BELTELECOM' freq 2412 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/19' | |
wlp1s0b1: BSS: Remove id 15 BSSID 50:17:ff:dc:2b:41 SSID 'VELCOM WIFI' due to no match in scan | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/15' | |
BSS: last_scan_res_used=11/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16ab2d0 done in 0.662358 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17) [s] | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/18) [s] | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/19) [s] | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16aa5a0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16aa5a0 after 0.000175 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000061 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.658060 seconds | |
nl80211: Received scan results (10 BSSes) | |
wlp1s0b1: BSS: Start scan result update 27 | |
wlp1s0b1: BSS: Add new id 20 BSSID 50:17:ff:dc:2b:41 SSID 'VELCOM WIFI' freq 2412 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/20' | |
BSS: last_scan_res_used=10/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16aa5a0 done in 0.659315 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/20) [s] | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16aef70 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16aef70 after 0.000158 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000062 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.660180 seconds | |
nl80211: send_and_recv->nl_recvmsgs failed: -33 | |
nl80211: Received scan results (4 BSSes) | |
wlp1s0b1: BSS: Start scan result update 28 | |
wlp1s0b1: BSS: Remove id 18 BSSID 0e:27:22:d5:d3:50 SSID 'bspu guest' due to no match in scan | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/18' | |
wlp1s0b1: BSS: Remove id 19 BSSID 50:17:ff:dc:2b:40 SSID 'BELTELECOM' due to no match in scan | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/19' | |
BSS: last_scan_res_used=4/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16aef70 done in 0.661405 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv] | |
properties_get_or_set: Set(ApScan) | |
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
wpa_dbus_dict_open_read: start reading a dict entry | |
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
proactive_key_caching=1 (0x1) | |
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate | |
ENGINE: engine deinit | |
wpa_dbus_dict_get_entry: dict entry key: password | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=6): [REMOVED] | |
password - hexdump_ascii(len=6): [REMOVED] | |
wpa_dbus_dict_get_entry: dict entry key: phase1 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase1 - hexdump_ascii(len=9): | |
70 65 61 70 76 65 72 3d 30 peapver=0 | |
wpa_dbus_dict_get_entry: dict entry key: eap | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 | |
wpa_dbus_dict_get_entry: dict entry key: phase2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase2 - hexdump_ascii(len=13): | |
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 | |
wpa_dbus_dict_get_entry: dict entry key: ca_path | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=7): [REMOVED] | |
ssid - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wpa_dbus_dict_get_entry: dict entry key: key_mgmt | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
key_mgmt: 0x1 | |
wpa_dbus_dict_get_entry: dict entry key: identity | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=12): [REMOVED] | |
identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED | |
wpa_dbus_dict_get_entry: dict entry key: scan_ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
scan_ssid=1 (0x1) | |
wpa_dbus_dict_get_entry: dict entry key: fragment_size | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266 | |
fragment_size=1266 (0x4f2) | |
wpa_dbus_dict_get_entry: dict entry key: ca_path2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path2 - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: bgscan | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=17): [REMOVED] | |
bgscan - hexdump_ascii(len=17): | |
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30 | |
30 0 | |
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
Fast associate: Old scan results | |
wlp1s0b1: Setting scan request: 0.000000 sec | |
wlp1s0b1: State: INACTIVE -> SCANNING | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x16a3a80 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16a3a80 after 0.000017 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000105 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.660441 seconds | |
nl80211: Received scan results (9 BSSes) | |
wlp1s0b1: BSS: Start scan result update 29 | |
wlp1s0b1: BSS: Remove id 20 BSSID 50:17:ff:dc:2b:41 SSID 'VELCOM WIFI' due to no match in scan | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/20' | |
BSS: last_scan_res_used=9/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16a3a80 done in 0.663193 seconds | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:98:f5:8c:f1 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-48 freq=2462 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 1: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-56 freq=2462 | |
wlp1s0b1: selected based on RSN IE | |
wlp1s0b1: selected BSS 00:3a:98:f5:8c:f0 ssid='eduroam' | |
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:98:f5:8c:f0 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16ae730 current_ssid=0x16ae730 | |
wlp1s0b1: Request association with 00:3a:98:f5:8c:f0 | |
wlp1s0b1: Add radio work 'sme-connect'@0x16a3a80 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'sme-connect'@0x16a3a80 after 0.000028 second wait | |
wlp1s0b1: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=0x16ae730 try_opportunistic=1 | |
RSN: Search for BSSID 00:3a:98:f5:8c:f0 | |
RSN: Consider 00:3a:98:f5:8c:f0 for OKC | |
RSN: No PMKSA cache entry found | |
wlp1s0b1: RSN: using IEEE 802.11i/D9.0 | |
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2 | |
wlp1s0b1: WPA: Selected mgmt group cipher 32 | |
wlp1s0b1: WPA: clearing AP WPA IE | |
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 | |
wlp1s0b1: WPA: using GTK TKIP | |
wlp1s0b1: WPA: using PTK CCMP | |
wlp1s0b1: WPA: using KEY_MGMT 802.1X | |
wlp1s0b1: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:8c:f0 (SSID='eduroam' freq=2462 MHz) | |
wlp1s0b1: State: SCANNING -> AUTHENTICATING | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
wlp1s0b1: Determining shared radio frequencies (max len 1) | |
wlp1s0b1: Shared frequencies (len=0): completed iteration | |
nl80211: Authenticate (ifindex=2) | |
* bssid=00:3a:98:f5:8c:f0 | |
* freq=2462 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1 | |
nl80211: New station 00:3a:98:f5:8c:f0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
nl80211: Event message available | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:8c:f0 | |
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 3a 98 f5 8c f0 b0 dd 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp1s0b1: Event AUTH (11) received | |
wlp1s0b1: SME: Authentication response: peer=00:3a:98:f5:8c:f0 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp1s0b1: set_disable_max_amsdu: -1 | |
wlp1s0b1: set_ampdu_factor: -1 | |
wlp1s0b1: set_ampdu_density: -1 | |
wlp1s0b1: set_disable_ht40: 0 | |
wlp1s0b1: set_disable_sgi: 0 | |
wlp1s0b1: set_disable_ldpc: 0 | |
wlp1s0b1: Trying to associate with 00:3a:98:f5:8c:f0 (SSID='eduroam' freq=2462 MHz) | |
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
nl80211: Associate (ifindex=2) | |
* bssid=00:3a:98:f5:8c:f0 | |
* freq=2462 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac02 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:8c:f0 | |
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 3a 98 f5 8c f0 d0 dd 31 04 00 00 02 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
nl80211: Associate event | |
wlp1s0b1: Event ASSOC (0) received | |
wlp1s0b1: Association info event | |
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
wlp1s0b1: freq=2462 MHz | |
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:98:f5:8c:f0 | |
wlp1s0b1: Associated with 00:3a:98:f5:8c:f0 | |
wlp1s0b1: WPA: Association event - clear replay counter | |
wlp1s0b1: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: enable timer tick | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec | |
wlp1s0b1: Cancelling scan request | |
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 | |
WMM AC: U-APSD queues=0x0 | |
WMM AC: Valid WMM association, WMM AC is enabled | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=50 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0 | |
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c 70 6f 72 74 69 64 3d 32 39 | |
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_PAE entering state RESTART | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 | |
EAP: EAP entering state IDENTITY | |
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started | |
EAP: Status notification: started (param=) | |
EAP: EAP-Request Identity data - hexdump_ascii(len=41): | |
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro | |
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c am,nasid=WiFi-B, | |
70 6f 72 74 69 64 3d 32 39 portid=29 | |
EAP: using real identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:8c:f0 | |
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=10 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0 | |
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state GET_METHOD | |
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 | |
EAP: Status notification: accept proposed method (param=PEAP) | |
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) | |
EAP-PEAP: Forced PEAP version 0 | |
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 | |
TLS: using phase1 config options | |
TLS: Trusted root certificate(s) loaded | |
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=6) - Flags 0x20 | |
EAP-PEAP: Start (server ver=0, own ver=0) | |
EAP-PEAP: Using PEAP version 0 | |
SSL: (where=0x10 ret=0x1) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:before/connect initialization | |
OpenSSL: TX ver=0x303 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x303 content_type=22 | |
OpenSSL: Message - hexdump(len=298): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:SSLv2/v3 write client hello A | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in SSLv2/v3 read server hello A | |
SSL: SSL_connect - want more data | |
SSL: 303 bytes pending from ssl_out | |
SSL: 303 bytes left to be sent out (of total 303 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1685b90 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:8c:f0 | |
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 47 aa a0 c8 f0 42 1c 3c a8 07 74 90 a7 02 2c 4b 3a 24 ec 1b 1b 9c 72 4d 93 53 f6 e4 7d 40 05 9b 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=8 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0 | |
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Failure | |
EAP: Status notification: completion (param=failure) | |
EAP: EAP entering state FAILURE | |
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed | |
EAPOL: SUPP_PAE entering state HELD | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Set supplicant port unauthorized for 00:3a:98:f5:8c:f0 | |
EAPOL: SUPP_BE entering state RECEIVE | |
EAPOL: SUPP_BE entering state FAIL | |
EAPOL: SUPP_BE entering state IDLE | |
EAPOL authentication completed - result=FAILURE | |
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=3 | |
* type=0 | |
* alpha2=RU | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=RU (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 40 MHz 20 mBm | |
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS) | |
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS) | |
nl80211: 5735-5835 @ 40 MHz 30 mBm | |
nl80211: 57000-66000 @ 2160 MHz 40 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
EAPOL: startWhen --> 0 | |
wlp1s0b1: Authentication with 00:3a:98:f5:8c:f0 timed out. | |
Added BSSID 00:3a:98:f5:8c:f0 into blacklist | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Request to deauthenticate - bssid=00:3a:98:f5:8c:f0 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED | |
TDLS: Tear down peers | |
wpa_driver_nl80211_deauthenticate(addr=00:3a:98:f5:8c:f0 reason_code=3) | |
wlp1s0b1: Event DEAUTH (12) received | |
wlp1s0b1: Deauthentication notification | |
wlp1s0b1: * reason 3 (locally generated) | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:98:f5:8c:f0 reason=3 locally_generated=1 | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED | |
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6) | |
wlp1s0b1: Setting scan request: 0.100000 sec | |
wlp1s0b1: Radio work 'sme-connect'@0x16a3a80 done in 2.073025 seconds | |
BSSID 00:3a:98:f5:8c:f0 blacklist count incremented to 2 | |
Continuous association failures - consider temporary network disabling | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=2 duration=33 reason=CONN_FAILED | |
wlp1s0b1: Blacklist count 8 --> request scan in 10000 ms | |
wlp1s0b1: Ignore new scan request for 10.000000 sec since an earlier request is scheduled to trigger sooner | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Disconnect event - remove keys | |
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WMM AC: WMM AC is disabled | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1 | |
nl80211: Delete station 00:3a:98:f5:8c:f0 | |
nl80211: Event message available | |
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:98:f5:8c:f0 A2=74:2f:68:d2:b1:f3 | |
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 98 f5 8c f0 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 00 03 00 | |
nl80211: Deauthenticate event | |
nl80211: Ignore deauth event triggered due to own deauth request | |
nl80211: Event message available | |
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1 | |
nl80211: Ignore disconnect event when using userspace SME | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=0 | |
* type=1 | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=00 | |
nl80211: 2402-2472 @ 40 MHz 20 mBm | |
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR) | |
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) | |
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) | |
nl80211: 57240-63720 @ 2160 MHz 0 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=1 | |
* type=0 | |
* alpha2=BY | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=BY (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 80 MHz 20 mBm | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) | |
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS) | |
nl80211: Added 802.11b mode based on 802.11g information | |
wlp1s0b1: State: DISCONNECTED -> SCANNING | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x16af3f0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16af3f0 after 0.000024 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000058 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.660059 seconds | |
nl80211: Received scan results (10 BSSes) | |
wlp1s0b1: BSS: Start scan result update 30 | |
wlp1s0b1: BSS: Add new id 21 BSSID 0e:27:22:d5:d3:50 SSID 'bspu guest' freq 2437 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/21' | |
BSS: last_scan_res_used=10/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP 1c:7e:e5:3e:ad:38 type 0 added | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP 00:18:e7:fa:7b:45 type 0 added | |
WPS: AP[0] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16af3f0 done in 0.661405 seconds | |
wlp1s0b1: Postpone network selection by 32 seconds since all networks are disabled | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/21) [s] | |
EAPOL: disable timer tick | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv] | |
properties_get_or_set: Set(ApScan) | |
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
wpa_dbus_dict_open_read: start reading a dict entry | |
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
proactive_key_caching=1 (0x1) | |
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate | |
ENGINE: engine deinit | |
wpa_dbus_dict_get_entry: dict entry key: password | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=6): [REMOVED] | |
password - hexdump_ascii(len=6): [REMOVED] | |
wpa_dbus_dict_get_entry: dict entry key: phase1 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase1 - hexdump_ascii(len=9): | |
70 65 61 70 76 65 72 3d 30 peapver=0 | |
wpa_dbus_dict_get_entry: dict entry key: eap | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 | |
wpa_dbus_dict_get_entry: dict entry key: phase2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase2 - hexdump_ascii(len=13): | |
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 | |
wpa_dbus_dict_get_entry: dict entry key: ca_path | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=7): [REMOVED] | |
ssid - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wpa_dbus_dict_get_entry: dict entry key: key_mgmt | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
key_mgmt: 0x1 | |
wpa_dbus_dict_get_entry: dict entry key: identity | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=12): [REMOVED] | |
identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED | |
wpa_dbus_dict_get_entry: dict entry key: scan_ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
scan_ssid=1 (0x1) | |
wpa_dbus_dict_get_entry: dict entry key: fragment_size | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266 | |
fragment_size=1266 (0x4f2) | |
wpa_dbus_dict_get_entry: dict entry key: ca_path2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path2 - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: bgscan | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=17): [REMOVED] | |
bgscan - hexdump_ascii(len=17): | |
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30 | |
30 0 | |
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
Fast associate: Old scan results | |
wlp1s0b1: Setting scan request: 0.000000 sec | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x16abc20 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16abc20 after 0.000017 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000055 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.670663 seconds | |
nl80211: Received scan results (10 BSSes) | |
wlp1s0b1: BSS: Start scan result update 31 | |
BSS: last_scan_res_used=10/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16abc20 done in 0.671675 seconds | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-43 freq=2462 | |
wlp1s0b1: skip - blacklisted (count=2 limit=0) | |
wlp1s0b1: 1: 00:3a:98:f5:8c:f1 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-44 freq=2462 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 2: 00:3a:99:d2:64:92 ssid='eduroam' wpa_ie_len=32 rsn_ie_len=28 caps=0x431 level=-77 freq=2412 | |
wlp1s0b1: selected based on RSN IE | |
wlp1s0b1: selected BSS 00:3a:99:d2:64:92 ssid='eduroam' | |
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:99:d2:64:92 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16ae730 current_ssid=0x16ae730 | |
wlp1s0b1: Request association with 00:3a:99:d2:64:92 | |
wlp1s0b1: Re-association to the same ESS | |
wlp1s0b1: Add radio work 'sme-connect'@0x16abc20 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'sme-connect'@0x16abc20 after 0.000026 second wait | |
wlp1s0b1: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=0x16ae730 try_opportunistic=1 | |
RSN: Search for BSSID 00:3a:99:d2:64:92 | |
RSN: Consider 00:3a:99:d2:64:92 for OKC | |
RSN: No PMKSA cache entry found | |
wlp1s0b1: RSN: using IEEE 802.11i/D9.0 | |
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2 | |
wlp1s0b1: WPA: Selected mgmt group cipher 32 | |
WPA: set AP WPA IE - hexdump(len=34): dd 20 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 02 00 00 50 f2 01 00 40 96 00 00 00 | |
WPA: set AP RSN IE - hexdump(len=30): 30 1c 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 02 00 00 0f ac 01 00 40 96 00 28 00 | |
wlp1s0b1: WPA: using GTK TKIP | |
wlp1s0b1: WPA: using PTK CCMP | |
wlp1s0b1: WPA: using KEY_MGMT 802.1X | |
wlp1s0b1: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: SME: Trying to authenticate with 00:3a:99:d2:64:92 (SSID='eduroam' freq=2412 MHz) | |
wlp1s0b1: State: SCANNING -> AUTHENTICATING | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
wlp1s0b1: Determining shared radio frequencies (max len 1) | |
wlp1s0b1: Shared frequencies (len=0): completed iteration | |
nl80211: Authenticate (ifindex=2) | |
* bssid=00:3a:99:d2:64:92 | |
* freq=2412 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1 | |
nl80211: New station 00:3a:99:d2:64:92 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17 | |
nl80211: Event message available | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:d2:64:92 | |
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 3a 99 d2 64 92 e0 42 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp1s0b1: Event AUTH (11) received | |
wlp1s0b1: SME: Authentication response: peer=00:3a:99:d2:64:92 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp1s0b1: set_disable_max_amsdu: -1 | |
wlp1s0b1: set_ampdu_factor: -1 | |
wlp1s0b1: set_ampdu_density: -1 | |
wlp1s0b1: set_disable_ht40: 0 | |
wlp1s0b1: set_disable_sgi: 0 | |
wlp1s0b1: set_disable_ldpc: 0 | |
wlp1s0b1: Trying to associate with 00:3a:99:d2:64:92 (SSID='eduroam' freq=2412 MHz) | |
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
nl80211: Associate (ifindex=2) | |
* bssid=00:3a:99:d2:64:92 | |
* freq=2412 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac02 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/21 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:d2:64:92 | |
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 3a 99 d2 64 92 f0 42 31 04 00 00 05 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
nl80211: Associate event | |
wlp1s0b1: Event ASSOC (0) received | |
wlp1s0b1: Association info event | |
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
wlp1s0b1: freq=2412 MHz | |
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:99:d2:64:92 | |
wlp1s0b1: Associated with 00:3a:99:d2:64:92 | |
wlp1s0b1: WPA: Association event - clear replay counter | |
wlp1s0b1: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: enable timer tick | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec | |
wlp1s0b1: Cancelling scan request | |
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 | |
WMM AC: U-APSD queues=0x0 | |
WMM AC: Valid WMM association, WMM AC is enabled | |
nl80211: Event message available | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
l2_packet_receive: src=00:3a:99:d2:64:92 len=50 | |
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92 | |
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c 70 6f 72 74 69 64 3d 32 39 | |
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_PAE entering state RESTART | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 | |
EAP: EAP entering state IDENTITY | |
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started | |
EAP: Status notification: started (param=) | |
EAP: EAP-Request Identity data - hexdump_ascii(len=41): | |
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro | |
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c am,nasid=WiFi-A, | |
70 6f 72 74 69 64 3d 32 39 portid=29 | |
EAP: using real identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:99:d2:64:92 | |
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41 | |
EAPOL: SUPP_BE entering state RECEIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=3 | |
* type=0 | |
* alpha2=RU | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=RU (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 40 MHz 20 mBm | |
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS) | |
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS) | |
nl80211: 5735-5835 @ 40 MHz 30 mBm | |
nl80211: 57000-66000 @ 2160 MHz 40 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
l2_packet_receive: src=00:3a:99:d2:64:92 len=10 | |
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92 | |
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state GET_METHOD | |
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 | |
EAP: Status notification: accept proposed method (param=PEAP) | |
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) | |
EAP-PEAP: Forced PEAP version 0 | |
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 | |
TLS: using phase1 config options | |
TLS: Trusted root certificate(s) loaded | |
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=6) - Flags 0x20 | |
EAP-PEAP: Start (server ver=0, own ver=0) | |
EAP-PEAP: Using PEAP version 0 | |
SSL: (where=0x10 ret=0x1) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:before/connect initialization | |
OpenSSL: TX ver=0x303 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x303 content_type=22 | |
OpenSSL: Message - hexdump(len=298): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:SSLv2/v3 write client hello A | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in SSLv2/v3 read server hello A | |
SSL: SSL_connect - want more data | |
SSL: 303 bytes pending from ssl_out | |
SSL: 303 bytes left to be sent out (of total 303 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x16aedc0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:99:d2:64:92 | |
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 20 20 3c 68 f9 00 f1 86 ec df 79 2e 54 87 f0 34 5e 68 90 9a e3 83 e5 6c 64 34 c5 39 6a 67 fe 06 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:99:d2:64:92 len=8 | |
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92 | |
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Failure | |
EAP: Status notification: completion (param=failure) | |
EAP: EAP entering state FAILURE | |
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed | |
EAPOL: SUPP_PAE entering state HELD | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Set supplicant port unauthorized for 00:3a:99:d2:64:92 | |
EAPOL: SUPP_BE entering state RECEIVE | |
EAPOL: SUPP_BE entering state FAIL | |
EAPOL: SUPP_BE entering state IDLE | |
EAPOL authentication completed - result=FAILURE | |
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec | |
EAPOL: startWhen --> 0 | |
wlp1s0b1: Authentication with 00:3a:99:d2:64:92 timed out. | |
Added BSSID 00:3a:99:d2:64:92 into blacklist | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Request to deauthenticate - bssid=00:3a:99:d2:64:92 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED | |
TDLS: Tear down peers | |
wpa_driver_nl80211_deauthenticate(addr=00:3a:99:d2:64:92 reason_code=3) | |
wlp1s0b1: Event DEAUTH (12) received | |
wlp1s0b1: Deauthentication notification | |
wlp1s0b1: * reason 3 (locally generated) | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:99:d2:64:92 reason=3 locally_generated=1 | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED | |
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6) | |
wlp1s0b1: Setting scan request: 0.100000 sec | |
wlp1s0b1: Radio work 'sme-connect'@0x16abc20 done in 2.058040 seconds | |
BSSID 00:3a:99:d2:64:92 blacklist count incremented to 2 | |
Continuous association failures - consider temporary network disabling | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=2 duration=35 reason=CONN_FAILED | |
wlp1s0b1: Blacklist count 8 --> request scan in 10000 ms | |
wlp1s0b1: Ignore new scan request for 10.000000 sec since an earlier request is scheduled to trigger sooner | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Disconnect event - remove keys | |
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WMM AC: WMM AC is disabled | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner | |
nl80211: Event message available | |
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1 | |
nl80211: Delete station 00:3a:99:d2:64:92 | |
nl80211: Event message available | |
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:99:d2:64:92 A2=74:2f:68:d2:b1:f3 | |
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 99 d2 64 92 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 00 03 00 | |
nl80211: Deauthenticate event | |
nl80211: Ignore deauth event triggered due to own deauth request | |
nl80211: Event message available | |
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1 | |
nl80211: Ignore disconnect event when using userspace SME | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=0 | |
* type=1 | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=00 | |
nl80211: 2402-2472 @ 40 MHz 20 mBm | |
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR) | |
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) | |
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) | |
nl80211: 57240-63720 @ 2160 MHz 0 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=1 | |
* type=0 | |
* alpha2=BY | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=BY (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 80 MHz 20 mBm | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) | |
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS) | |
nl80211: Added 802.11b mode based on 802.11g information | |
wlp1s0b1: State: DISCONNECTED -> SCANNING | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x16ac0e0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16ac0e0 after 0.000021 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000071 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.673201 seconds | |
nl80211: Received scan results (12 BSSes) | |
wlp1s0b1: BSS: Start scan result update 32 | |
wlp1s0b1: BSS: Add new id 22 BSSID 50:17:ff:dc:2b:41 SSID 'VELCOM WIFI' freq 2412 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/22' | |
wlp1s0b1: BSS: Add new id 23 BSSID 50:17:ff:dc:2b:40 SSID 'BELTELECOM' freq 2412 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/23' | |
BSS: last_scan_res_used=12/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP 00:18:e7:fa:7b:45 type 0 added | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP 1c:7e:e5:3e:ad:38 type 0 added | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16ac0e0 done in 0.674888 seconds | |
wlp1s0b1: Postpone network selection by 34 seconds since all networks are disabled | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/21 | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/22) [s] | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/23) [s] | |
EAPOL: disable timer tick | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
wlp1s0b1: Try to associate due to network getting re-enabled | |
Fast associate: Old scan results | |
wlp1s0b1: Setting scan request: 0.000000 sec | |
wlp1s0b1: No enabled networks - do not scan | |
wlp1s0b1: State: SCANNING -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16af3f0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16af3f0 after 0.000165 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000083 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.658208 seconds | |
nl80211: Received scan results (9 BSSes) | |
wlp1s0b1: BSS: Start scan result update 33 | |
BSS: last_scan_res_used=9/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16af3f0 done in 0.659254 seconds | |
wlp1s0b1: No APs found - clear blacklist and try again | |
Removed BSSID 00:3a:99:d2:64:92 from blacklist (clear) | |
Removed BSSID 00:3a:98:f5:8c:f0 from blacklist (clear) | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/23 | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16af3f0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16af3f0 after 0.000153 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000058 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.658620 seconds | |
nl80211: Received scan results (12 BSSes) | |
wlp1s0b1: BSS: Start scan result update 34 | |
wlp1s0b1: BSS: Add new id 24 BSSID 02:1a:11:f8:8a:47 SSID 'taxi5' freq 2437 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/24' | |
wlp1s0b1: BSS: Remove id 22 BSSID 50:17:ff:dc:2b:41 SSID 'VELCOM WIFI' due to no match in scan | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/22' | |
BSS: last_scan_res_used=12/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16af3f0 done in 0.659973 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/21 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/23 | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/24) [s] | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16a4eb0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16a4eb0 after 0.000178 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000067 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.657414 seconds | |
nl80211: Received scan results (13 BSSes) | |
wlp1s0b1: BSS: Start scan result update 35 | |
wlp1s0b1: BSS: Add new id 25 BSSID 12:27:22:d5:d3:50 SSID 'bspu' freq 2437 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/25' | |
BSS: last_scan_res_used=13/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16a4eb0 done in 0.658721 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/21 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/23 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/24 | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/25) [s] | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16aee70 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16aee70 after 0.000188 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000059 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.664355 seconds | |
nl80211: Received scan results (9 BSSes) | |
wlp1s0b1: BSS: Start scan result update 36 | |
BSS: last_scan_res_used=9/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16aee70 done in 0.665541 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/23 | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x16abd20 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16abd20 after 0.000178 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000063 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.665167 seconds | |
nl80211: Received scan results (8 BSSes) | |
wlp1s0b1: BSS: Start scan result update 37 | |
wlp1s0b1: BSS: Remove id 17 BSSID 00:3a:9a:00:7c:42 SSID 'eduroam' due to no match in scan | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/17' | |
wlp1s0b1: BSS: Remove id 25 BSSID 12:27:22:d5:d3:50 SSID 'bspu' due to no match in scan | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/25' | |
wlp1s0b1: BSS: Remove id 21 BSSID 0e:27:22:d5:d3:50 SSID 'bspu guest' due to no match in scan | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/21' | |
wlp1s0b1: BSS: Remove id 24 BSSID 02:1a:11:f8:8a:47 SSID 'taxi5' due to no match in scan | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/24' | |
BSS: last_scan_res_used=8/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16abd20 done in 0.666531 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv] | |
properties_get_or_set: Set(ApScan) | |
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
wpa_dbus_dict_open_read: start reading a dict entry | |
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
proactive_key_caching=1 (0x1) | |
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate | |
ENGINE: engine deinit | |
wpa_dbus_dict_get_entry: dict entry key: password | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=6): [REMOVED] | |
password - hexdump_ascii(len=6): [REMOVED] | |
wpa_dbus_dict_get_entry: dict entry key: phase1 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase1 - hexdump_ascii(len=9): | |
70 65 61 70 76 65 72 3d 30 peapver=0 | |
wpa_dbus_dict_get_entry: dict entry key: eap | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 | |
wpa_dbus_dict_get_entry: dict entry key: phase2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase2 - hexdump_ascii(len=13): | |
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 | |
wpa_dbus_dict_get_entry: dict entry key: ca_path | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=7): [REMOVED] | |
ssid - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wpa_dbus_dict_get_entry: dict entry key: key_mgmt | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
key_mgmt: 0x1 | |
wpa_dbus_dict_get_entry: dict entry key: identity | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=12): [REMOVED] | |
identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED | |
wpa_dbus_dict_get_entry: dict entry key: scan_ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
scan_ssid=1 (0x1) | |
wpa_dbus_dict_get_entry: dict entry key: fragment_size | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266 | |
fragment_size=1266 (0x4f2) | |
wpa_dbus_dict_get_entry: dict entry key: ca_path2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path2 - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: bgscan | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=17): [REMOVED] | |
bgscan - hexdump_ascii(len=17): | |
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30 | |
30 0 | |
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
Fast associate: Old scan results | |
wlp1s0b1: Setting scan request: 0.000000 sec | |
wlp1s0b1: State: INACTIVE -> SCANNING | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x16a3660 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16a3660 after 0.000080 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000081 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.666594 seconds | |
nl80211: Received scan results (10 BSSes) | |
wlp1s0b1: BSS: Start scan result update 38 | |
wlp1s0b1: BSS: Add new id 26 BSSID 00:3a:9a:00:7c:42 SSID 'eduroam' freq 2437 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/26' | |
wlp1s0b1: BSS: Add new id 27 BSSID 0a:27:22:d5:d3:50 SSID 'bspu public' freq 2437 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/27' | |
wlp1s0b1: BSS: Remove id 23 BSSID 50:17:ff:dc:2b:40 SSID 'BELTELECOM' due to no match in scan | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/23' | |
BSS: last_scan_res_used=10/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16a3660 done in 0.668079 seconds | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:98:f5:8c:f1 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-49 freq=2462 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 1: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-50 freq=2462 | |
wlp1s0b1: selected based on RSN IE | |
wlp1s0b1: selected BSS 00:3a:98:f5:8c:f0 ssid='eduroam' | |
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:98:f5:8c:f0 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16ae730 current_ssid=0x16ae730 | |
wlp1s0b1: Request association with 00:3a:98:f5:8c:f0 | |
wlp1s0b1: Re-association to the same ESS | |
wlp1s0b1: Add radio work 'sme-connect'@0x16a3660 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'sme-connect'@0x16a3660 after 0.000030 second wait | |
wlp1s0b1: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=0x16ae730 try_opportunistic=1 | |
RSN: Search for BSSID 00:3a:98:f5:8c:f0 | |
RSN: Consider 00:3a:98:f5:8c:f0 for OKC | |
RSN: No PMKSA cache entry found | |
wlp1s0b1: RSN: using IEEE 802.11i/D9.0 | |
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2 | |
wlp1s0b1: WPA: Selected mgmt group cipher 32 | |
wlp1s0b1: WPA: clearing AP WPA IE | |
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 | |
wlp1s0b1: WPA: using GTK TKIP | |
wlp1s0b1: WPA: using PTK CCMP | |
wlp1s0b1: WPA: using KEY_MGMT 802.1X | |
wlp1s0b1: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:8c:f0 (SSID='eduroam' freq=2462 MHz) | |
wlp1s0b1: State: SCANNING -> AUTHENTICATING | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
wlp1s0b1: Determining shared radio frequencies (max len 1) | |
wlp1s0b1: Shared frequencies (len=0): completed iteration | |
nl80211: Authenticate (ifindex=2) | |
* bssid=00:3a:98:f5:8c:f0 | |
* freq=2462 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
nl80211: Event message available | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1 | |
nl80211: New station 00:3a:98:f5:8c:f0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:8c:f0 | |
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 3a 98 f5 8c f0 80 16 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp1s0b1: Event AUTH (11) received | |
wlp1s0b1: SME: Authentication response: peer=00:3a:98:f5:8c:f0 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp1s0b1: set_disable_max_amsdu: -1 | |
wlp1s0b1: set_ampdu_factor: -1 | |
wlp1s0b1: set_ampdu_density: -1 | |
wlp1s0b1: set_disable_ht40: 0 | |
wlp1s0b1: set_disable_sgi: 0 | |
wlp1s0b1: set_disable_ldpc: 0 | |
wlp1s0b1: Trying to associate with 00:3a:98:f5:8c:f0 (SSID='eduroam' freq=2462 MHz) | |
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
nl80211: Associate (ifindex=2) | |
* bssid=00:3a:98:f5:8c:f0 | |
* freq=2462 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac02 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:8c:f0 | |
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 3a 98 f5 8c f0 90 16 31 04 00 00 02 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
nl80211: Associate event | |
wlp1s0b1: Event ASSOC (0) received | |
wlp1s0b1: Association info event | |
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
wlp1s0b1: freq=2462 MHz | |
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:98:f5:8c:f0 | |
wlp1s0b1: Associated with 00:3a:98:f5:8c:f0 | |
wlp1s0b1: WPA: Association event - clear replay counter | |
wlp1s0b1: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: enable timer tick | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec | |
wlp1s0b1: Cancelling scan request | |
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 | |
WMM AC: U-APSD queues=0x0 | |
WMM AC: Valid WMM association, WMM AC is enabled | |
nl80211: Event message available | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=50 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0 | |
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c 70 6f 72 74 69 64 3d 32 39 | |
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_PAE entering state RESTART | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 | |
EAP: EAP entering state IDENTITY | |
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started | |
EAP: Status notification: started (param=) | |
EAP: EAP-Request Identity data - hexdump_ascii(len=41): | |
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro | |
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c am,nasid=WiFi-B, | |
70 6f 72 74 69 64 3d 32 39 portid=29 | |
EAP: using real identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:8c:f0 | |
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41 | |
EAPOL: SUPP_BE entering state RECEIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=3 | |
* type=0 | |
* alpha2=RU | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=RU (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 40 MHz 20 mBm | |
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS) | |
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS) | |
nl80211: 5735-5835 @ 40 MHz 30 mBm | |
nl80211: 57000-66000 @ 2160 MHz 40 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=10 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0 | |
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state GET_METHOD | |
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 | |
EAP: Status notification: accept proposed method (param=PEAP) | |
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) | |
EAP-PEAP: Forced PEAP version 0 | |
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 | |
TLS: using phase1 config options | |
TLS: Trusted root certificate(s) loaded | |
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=6) - Flags 0x20 | |
EAP-PEAP: Start (server ver=0, own ver=0) | |
EAP-PEAP: Using PEAP version 0 | |
SSL: (where=0x10 ret=0x1) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:before/connect initialization | |
OpenSSL: TX ver=0x303 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x303 content_type=22 | |
OpenSSL: Message - hexdump(len=298): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:SSLv2/v3 write client hello A | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in SSLv2/v3 read server hello A | |
SSL: SSL_connect - want more data | |
SSL: 303 bytes pending from ssl_out | |
SSL: 303 bytes left to be sent out (of total 303 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x16aeec0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:8c:f0 | |
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 cf 54 28 fd 16 4f 2a 0e 31 93 36 4a fe 08 23 69 99 92 94 1a 73 51 34 3b 40 f8 f8 77 b6 a2 14 89 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:8c:f0 len=8 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:8c:f0 | |
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Failure | |
EAP: Status notification: completion (param=failure) | |
EAP: EAP entering state FAILURE | |
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed | |
EAPOL: SUPP_PAE entering state HELD | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Set supplicant port unauthorized for 00:3a:98:f5:8c:f0 | |
EAPOL: SUPP_BE entering state RECEIVE | |
EAPOL: SUPP_BE entering state FAIL | |
EAPOL: SUPP_BE entering state IDLE | |
EAPOL authentication completed - result=FAILURE | |
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/26) [s] | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/27) [s] | |
EAPOL: startWhen --> 0 | |
wlp1s0b1: Authentication with 00:3a:98:f5:8c:f0 timed out. | |
Added BSSID 00:3a:98:f5:8c:f0 into blacklist | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Request to deauthenticate - bssid=00:3a:98:f5:8c:f0 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED | |
TDLS: Tear down peers | |
wpa_driver_nl80211_deauthenticate(addr=00:3a:98:f5:8c:f0 reason_code=3) | |
wlp1s0b1: Event DEAUTH (12) received | |
wlp1s0b1: Deauthentication notification | |
wlp1s0b1: * reason 3 (locally generated) | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:98:f5:8c:f0 reason=3 locally_generated=1 | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED | |
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6) | |
wlp1s0b1: Setting scan request: 0.100000 sec | |
wlp1s0b1: Radio work 'sme-connect'@0x16a3660 done in 2.044565 seconds | |
BSSID 00:3a:98:f5:8c:f0 blacklist count incremented to 2 | |
Continuous association failures - consider temporary network disabling | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=2 duration=26 reason=CONN_FAILED | |
wlp1s0b1: Blacklist count 10 --> request scan in 10000 ms | |
wlp1s0b1: Ignore new scan request for 10.000000 sec since an earlier request is scheduled to trigger sooner | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Disconnect event - remove keys | |
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WMM AC: WMM AC is disabled | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner | |
nl80211: Event message available | |
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1 | |
nl80211: Delete station 00:3a:98:f5:8c:f0 | |
nl80211: Event message available | |
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:98:f5:8c:f0 A2=74:2f:68:d2:b1:f3 | |
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 98 f5 8c f0 74 2f 68 d2 b1 f3 00 3a 98 f5 8c f0 00 00 03 00 | |
nl80211: Deauthenticate event | |
nl80211: Ignore deauth event triggered due to own deauth request | |
nl80211: Event message available | |
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1 | |
nl80211: Ignore disconnect event when using userspace SME | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=0 | |
* type=1 | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=00 | |
nl80211: 2402-2472 @ 40 MHz 20 mBm | |
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR) | |
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) | |
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) | |
nl80211: 57240-63720 @ 2160 MHz 0 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=1 | |
* type=0 | |
* alpha2=BY | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=BY (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 80 MHz 20 mBm | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) | |
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS) | |
nl80211: Added 802.11b mode based on 802.11g information | |
wlp1s0b1: State: DISCONNECTED -> SCANNING | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x16af3f0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16af3f0 after 0.000035 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000066 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.663136 seconds | |
nl80211: Received scan results (10 BSSes) | |
wlp1s0b1: BSS: Start scan result update 39 | |
BSS: last_scan_res_used=10/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP 1c:7e:e5:3e:ad:38 type 0 added | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP 00:18:e7:fa:7b:45 type 0 added | |
WPS: AP[0] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16af3f0 done in 0.664290 seconds | |
wlp1s0b1: Postpone network selection by 25 seconds since all networks are disabled | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/26 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/27 | |
EAPOL: disable timer tick | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
wlp1s0b1: Try to associate due to network getting re-enabled | |
Fast associate: Old scan results | |
wlp1s0b1: Setting scan request: 0.000000 sec | |
wlp1s0b1: No enabled networks - do not scan | |
wlp1s0b1: State: SCANNING -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv] | |
properties_get_or_set: Set(ApScan) | |
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
wpa_dbus_dict_open_read: start reading a dict entry | |
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
proactive_key_caching=1 (0x1) | |
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate | |
ENGINE: engine deinit | |
wpa_dbus_dict_get_entry: dict entry key: password | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=6): [REMOVED] | |
password - hexdump_ascii(len=6): [REMOVED] | |
wpa_dbus_dict_get_entry: dict entry key: phase1 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase1 - hexdump_ascii(len=9): | |
70 65 61 70 76 65 72 3d 30 peapver=0 | |
wpa_dbus_dict_get_entry: dict entry key: eap | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 | |
wpa_dbus_dict_get_entry: dict entry key: phase2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase2 - hexdump_ascii(len=13): | |
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 | |
wpa_dbus_dict_get_entry: dict entry key: ca_path | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=7): [REMOVED] | |
ssid - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wpa_dbus_dict_get_entry: dict entry key: key_mgmt | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
key_mgmt: 0x1 | |
wpa_dbus_dict_get_entry: dict entry key: identity | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=12): [REMOVED] | |
identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED | |
wpa_dbus_dict_get_entry: dict entry key: scan_ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
scan_ssid=1 (0x1) | |
wpa_dbus_dict_get_entry: dict entry key: fragment_size | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266 | |
fragment_size=1266 (0x4f2) | |
wpa_dbus_dict_get_entry: dict entry key: ca_path2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path2 - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: bgscan | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=17): [REMOVED] | |
bgscan - hexdump_ascii(len=17): | |
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30 | |
30 0 | |
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
Fast associate: Old scan results | |
wlp1s0b1: Setting scan request: 0.000000 sec | |
wlp1s0b1: State: INACTIVE -> SCANNING | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x16a4ad0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16a4ad0 after 0.000017 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000058 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.662012 seconds | |
nl80211: Received scan results (10 BSSes) | |
wlp1s0b1: BSS: Start scan result update 40 | |
BSS: last_scan_res_used=10/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16a4ad0 done in 0.663022 seconds | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:98:f5:8c:f1 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-47 freq=2462 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 1: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-48 freq=2462 | |
wlp1s0b1: skip - blacklisted (count=2 limit=0) | |
wlp1s0b1: 2: 00:3a:99:d2:64:92 ssid='eduroam' wpa_ie_len=32 rsn_ie_len=28 caps=0x431 level=-72 freq=2412 | |
wlp1s0b1: selected based on RSN IE | |
wlp1s0b1: selected BSS 00:3a:99:d2:64:92 ssid='eduroam' | |
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:99:d2:64:92 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16abcf0 current_ssid=0x16abcf0 | |
wlp1s0b1: Request association with 00:3a:99:d2:64:92 | |
wlp1s0b1: Add radio work 'sme-connect'@0x16a4ad0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'sme-connect'@0x16a4ad0 after 0.000027 second wait | |
wlp1s0b1: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=0x16abcf0 try_opportunistic=1 | |
RSN: Search for BSSID 00:3a:99:d2:64:92 | |
RSN: Consider 00:3a:99:d2:64:92 for OKC | |
RSN: No PMKSA cache entry found | |
wlp1s0b1: RSN: using IEEE 802.11i/D9.0 | |
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2 | |
wlp1s0b1: WPA: Selected mgmt group cipher 32 | |
WPA: set AP WPA IE - hexdump(len=34): dd 20 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 02 00 00 50 f2 01 00 40 96 00 00 00 | |
WPA: set AP RSN IE - hexdump(len=30): 30 1c 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 02 00 00 0f ac 01 00 40 96 00 28 00 | |
wlp1s0b1: WPA: using GTK TKIP | |
wlp1s0b1: WPA: using PTK CCMP | |
wlp1s0b1: WPA: using KEY_MGMT 802.1X | |
wlp1s0b1: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: SME: Trying to authenticate with 00:3a:99:d2:64:92 (SSID='eduroam' freq=2412 MHz) | |
wlp1s0b1: State: SCANNING -> AUTHENTICATING | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
wlp1s0b1: Determining shared radio frequencies (max len 1) | |
wlp1s0b1: Shared frequencies (len=0): completed iteration | |
nl80211: Authenticate (ifindex=2) | |
* bssid=00:3a:99:d2:64:92 | |
* freq=2412 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1 | |
nl80211: New station 00:3a:99:d2:64:92 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/26 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/27 | |
nl80211: Event message available | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:d2:64:92 | |
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 3a 99 d2 64 92 10 ba 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp1s0b1: Event AUTH (11) received | |
wlp1s0b1: SME: Authentication response: peer=00:3a:99:d2:64:92 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp1s0b1: set_disable_max_amsdu: -1 | |
wlp1s0b1: set_ampdu_factor: -1 | |
wlp1s0b1: set_ampdu_density: -1 | |
wlp1s0b1: set_disable_ht40: 0 | |
wlp1s0b1: set_disable_sgi: 0 | |
wlp1s0b1: set_disable_ldpc: 0 | |
wlp1s0b1: Trying to associate with 00:3a:99:d2:64:92 (SSID='eduroam' freq=2412 MHz) | |
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
nl80211: Associate (ifindex=2) | |
* bssid=00:3a:99:d2:64:92 | |
* freq=2412 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac02 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:d2:64:92 | |
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 3a 99 d2 64 92 20 ba 31 04 00 00 05 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
nl80211: Associate event | |
wlp1s0b1: Event ASSOC (0) received | |
wlp1s0b1: Association info event | |
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
wlp1s0b1: freq=2412 MHz | |
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:99:d2:64:92 | |
wlp1s0b1: Associated with 00:3a:99:d2:64:92 | |
wlp1s0b1: WPA: Association event - clear replay counter | |
wlp1s0b1: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: enable timer tick | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec | |
wlp1s0b1: Cancelling scan request | |
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 | |
WMM AC: U-APSD queues=0x0 | |
WMM AC: Valid WMM association, WMM AC is enabled | |
nl80211: Event message available | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=3 | |
* type=0 | |
* alpha2=RU | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=RU (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 40 MHz 20 mBm | |
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS) | |
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS) | |
nl80211: 5735-5835 @ 40 MHz 30 mBm | |
nl80211: 57000-66000 @ 2160 MHz 40 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
l2_packet_receive: src=00:3a:99:d2:64:92 len=50 | |
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92 | |
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c 70 6f 72 74 69 64 3d 32 39 | |
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_PAE entering state RESTART | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 | |
EAP: EAP entering state IDENTITY | |
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started | |
EAP: Status notification: started (param=) | |
EAP: EAP-Request Identity data - hexdump_ascii(len=41): | |
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro | |
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c am,nasid=WiFi-A, | |
70 6f 72 74 69 64 3d 32 39 portid=29 | |
EAP: using real identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:99:d2:64:92 | |
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:99:d2:64:92 len=10 | |
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92 | |
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state GET_METHOD | |
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 | |
EAP: Status notification: accept proposed method (param=PEAP) | |
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) | |
EAP-PEAP: Forced PEAP version 0 | |
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 | |
TLS: using phase1 config options | |
TLS: Trusted root certificate(s) loaded | |
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=6) - Flags 0x20 | |
EAP-PEAP: Start (server ver=0, own ver=0) | |
EAP-PEAP: Using PEAP version 0 | |
SSL: (where=0x10 ret=0x1) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:before/connect initialization | |
OpenSSL: TX ver=0x303 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x303 content_type=22 | |
OpenSSL: Message - hexdump(len=298): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:SSLv2/v3 write client hello A | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in SSLv2/v3 read server hello A | |
SSL: SSL_connect - want more data | |
SSL: 303 bytes pending from ssl_out | |
SSL: 303 bytes left to be sent out (of total 303 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x16a8f10 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:99:d2:64:92 | |
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 36 e4 16 c9 7b 69 34 95 8d ee c0 eb bd ce 24 04 7a 03 c2 c5 0f 44 f9 e3 22 f3 ac 6f fb 93 77 cf 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01 | |
EAPOL: SUPP_BE entering state RECEIVE | |
EAPOL: startWhen --> 0 | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
wlp1s0b1: Request to deauthenticate - bssid=00:3a:99:d2:64:92 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED | |
TDLS: Tear down peers | |
wpa_driver_nl80211_deauthenticate(addr=00:3a:99:d2:64:92 reason_code=3) | |
wlp1s0b1: Event DEAUTH (12) received | |
wlp1s0b1: Deauthentication notification | |
wlp1s0b1: * reason 3 (locally generated) | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:99:d2:64:92 reason=3 locally_generated=1 | |
wlp1s0b1: Auto connect disabled: do not try to re-connect | |
wlp1s0b1: Radio work 'sme-connect'@0x16a4ad0 done in 24.227999 seconds | |
wlp1s0b1: Ignore connection failure indication since interface has been put into disconnected state | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Disconnect event - remove keys | |
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WMM AC: WMM AC is disabled | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1 | |
nl80211: Delete station 00:3a:99:d2:64:92 | |
nl80211: Event message available | |
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:99:d2:64:92 A2=74:2f:68:d2:b1:f3 | |
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 99 d2 64 92 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 00 03 00 | |
nl80211: Deauthenticate event | |
nl80211: Ignore deauth event triggered due to own deauth request | |
nl80211: Event message available | |
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1 | |
nl80211: Ignore disconnect event when using userspace SME | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=0 | |
* type=1 | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=00 | |
nl80211: 2402-2472 @ 40 MHz 20 mBm | |
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR) | |
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) | |
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) | |
nl80211: 57240-63720 @ 2160 MHz 0 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=1 | |
* type=0 | |
* alpha2=BY | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=BY (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 80 MHz 20 mBm | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) | |
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS) | |
nl80211: Added 802.11b mode based on 802.11g information | |
EAPOL: disable timer tick | |
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv] | |
properties_get_or_set: Set(ApScan) | |
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
wpa_dbus_dict_open_read: start reading a dict entry | |
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
proactive_key_caching=1 (0x1) | |
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate | |
ENGINE: engine deinit | |
wpa_dbus_dict_get_entry: dict entry key: password | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=6): [REMOVED] | |
password - hexdump_ascii(len=6): [REMOVED] | |
wpa_dbus_dict_get_entry: dict entry key: phase1 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase1 - hexdump_ascii(len=9): | |
70 65 61 70 76 65 72 3d 30 peapver=0 | |
wpa_dbus_dict_get_entry: dict entry key: eap | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 | |
wpa_dbus_dict_get_entry: dict entry key: phase2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase2 - hexdump_ascii(len=13): | |
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 | |
wpa_dbus_dict_get_entry: dict entry key: ca_path | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=7): [REMOVED] | |
ssid - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wpa_dbus_dict_get_entry: dict entry key: key_mgmt | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
key_mgmt: 0x1 | |
wpa_dbus_dict_get_entry: dict entry key: identity | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=12): [REMOVED] | |
identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED | |
wpa_dbus_dict_get_entry: dict entry key: scan_ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
scan_ssid=1 (0x1) | |
wpa_dbus_dict_get_entry: dict entry key: fragment_size | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266 | |
fragment_size=1266 (0x4f2) | |
wpa_dbus_dict_get_entry: dict entry key: ca_path2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path2 - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: bgscan | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=17): [REMOVED] | |
bgscan - hexdump_ascii(len=17): | |
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30 | |
30 0 | |
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
Fast associate: Old scan results | |
wlp1s0b1: Setting scan request: 0.000000 sec | |
wlp1s0b1: State: DISCONNECTED -> SCANNING | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x16a4b30 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16a4b30 after 0.000016 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000059 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.666654 seconds | |
nl80211: Received scan results (10 BSSes) | |
wlp1s0b1: BSS: Start scan result update 41 | |
wlp1s0b1: BSS: Add new id 28 BSSID 50:17:ff:dc:2b:40 SSID 'BELTELECOM' freq 2412 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/28' | |
BSS: last_scan_res_used=10/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16a4b30 done in 0.667980 seconds | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-47 freq=2462 | |
wlp1s0b1: skip - blacklisted (count=2 limit=0) | |
wlp1s0b1: 1: 00:3a:98:f5:8c:f1 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-59 freq=2462 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 2: 00:3a:99:d2:64:92 ssid='eduroam' wpa_ie_len=32 rsn_ie_len=28 caps=0x431 level=-70 freq=2412 | |
wlp1s0b1: selected based on RSN IE | |
wlp1s0b1: selected BSS 00:3a:99:d2:64:92 ssid='eduroam' | |
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:99:d2:64:92 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16abcf0 current_ssid=0x16abcf0 | |
wlp1s0b1: Request association with 00:3a:99:d2:64:92 | |
wlp1s0b1: Re-association to the same ESS | |
wlp1s0b1: Add radio work 'sme-connect'@0x16a4b30 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'sme-connect'@0x16a4b30 after 0.000032 second wait | |
wlp1s0b1: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=0x16abcf0 try_opportunistic=1 | |
RSN: Search for BSSID 00:3a:99:d2:64:92 | |
RSN: Consider 00:3a:99:d2:64:92 for OKC | |
RSN: No PMKSA cache entry found | |
wlp1s0b1: RSN: using IEEE 802.11i/D9.0 | |
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2 | |
wlp1s0b1: WPA: Selected mgmt group cipher 32 | |
WPA: set AP WPA IE - hexdump(len=34): dd 20 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 02 00 00 50 f2 01 00 40 96 00 00 00 | |
WPA: set AP RSN IE - hexdump(len=30): 30 1c 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 02 00 00 0f ac 01 00 40 96 00 28 00 | |
wlp1s0b1: WPA: using GTK TKIP | |
wlp1s0b1: WPA: using PTK CCMP | |
wlp1s0b1: WPA: using KEY_MGMT 802.1X | |
wlp1s0b1: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: SME: Trying to authenticate with 00:3a:99:d2:64:92 (SSID='eduroam' freq=2412 MHz) | |
wlp1s0b1: State: SCANNING -> AUTHENTICATING | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
wlp1s0b1: Determining shared radio frequencies (max len 1) | |
wlp1s0b1: Shared frequencies (len=0): completed iteration | |
nl80211: Authenticate (ifindex=2) | |
* bssid=00:3a:99:d2:64:92 | |
* freq=2412 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
nl80211: Event message available | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1 | |
nl80211: New station 00:3a:99:d2:64:92 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/26 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
nl80211: Event message available | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:d2:64:92 | |
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 3a 99 d2 64 92 30 dd 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp1s0b1: Event AUTH (11) received | |
wlp1s0b1: SME: Authentication response: peer=00:3a:99:d2:64:92 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp1s0b1: set_disable_max_amsdu: -1 | |
wlp1s0b1: set_ampdu_factor: -1 | |
wlp1s0b1: set_ampdu_density: -1 | |
wlp1s0b1: set_disable_ht40: 0 | |
wlp1s0b1: set_disable_sgi: 0 | |
wlp1s0b1: set_disable_ldpc: 0 | |
wlp1s0b1: Trying to associate with 00:3a:99:d2:64:92 (SSID='eduroam' freq=2412 MHz) | |
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
nl80211: Associate (ifindex=2) | |
* bssid=00:3a:99:d2:64:92 | |
* freq=2412 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac02 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:d2:64:92 | |
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 3a 99 d2 64 92 50 dd 31 04 00 00 05 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
nl80211: Associate event | |
wlp1s0b1: Event ASSOC (0) received | |
wlp1s0b1: Association info event | |
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
wlp1s0b1: freq=2412 MHz | |
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:99:d2:64:92 | |
wlp1s0b1: Associated with 00:3a:99:d2:64:92 | |
wlp1s0b1: WPA: Association event - clear replay counter | |
wlp1s0b1: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: enable timer tick | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec | |
wlp1s0b1: Cancelling scan request | |
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 | |
WMM AC: U-APSD queues=0x0 | |
WMM AC: Valid WMM association, WMM AC is enabled | |
nl80211: Event message available | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
l2_packet_receive: src=00:3a:99:d2:64:92 len=50 | |
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92 | |
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c 70 6f 72 74 69 64 3d 32 39 | |
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_PAE entering state RESTART | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 | |
EAP: EAP entering state IDENTITY | |
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started | |
EAP: Status notification: started (param=) | |
EAP: EAP-Request Identity data - hexdump_ascii(len=41): | |
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro | |
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c am,nasid=WiFi-A, | |
70 6f 72 74 69 64 3d 32 39 portid=29 | |
EAP: using real identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:99:d2:64:92 | |
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41 | |
EAPOL: SUPP_BE entering state RECEIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=3 | |
* type=0 | |
* alpha2=RU | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=RU (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 40 MHz 20 mBm | |
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS) | |
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS) | |
nl80211: 5735-5835 @ 40 MHz 30 mBm | |
nl80211: 57000-66000 @ 2160 MHz 40 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
l2_packet_receive: src=00:3a:99:d2:64:92 len=10 | |
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92 | |
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state GET_METHOD | |
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 | |
EAP: Status notification: accept proposed method (param=PEAP) | |
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) | |
EAP-PEAP: Forced PEAP version 0 | |
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 | |
TLS: using phase1 config options | |
TLS: Trusted root certificate(s) loaded | |
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=6) - Flags 0x20 | |
EAP-PEAP: Start (server ver=0, own ver=0) | |
EAP-PEAP: Using PEAP version 0 | |
SSL: (where=0x10 ret=0x1) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:before/connect initialization | |
OpenSSL: TX ver=0x303 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x303 content_type=22 | |
OpenSSL: Message - hexdump(len=298): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:SSLv2/v3 write client hello A | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in SSLv2/v3 read server hello A | |
SSL: SSL_connect - want more data | |
SSL: 303 bytes pending from ssl_out | |
SSL: 303 bytes left to be sent out (of total 303 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x16a9840 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:99:d2:64:92 | |
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 dd 3d 5a 99 35 f2 59 32 e8 af a4 cc 42 1f a5 b2 56 4d ed 92 7b e6 aa 91 84 2e 8e d0 c7 ff dc c9 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:99:d2:64:92 len=8 | |
wlp1s0b1: RX EAPOL from 00:3a:99:d2:64:92 | |
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Failure | |
EAP: Status notification: completion (param=failure) | |
EAP: EAP entering state FAILURE | |
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed | |
EAPOL: SUPP_PAE entering state HELD | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Set supplicant port unauthorized for 00:3a:99:d2:64:92 | |
EAPOL: SUPP_BE entering state RECEIVE | |
EAPOL: SUPP_BE entering state FAIL | |
EAPOL: SUPP_BE entering state IDLE | |
EAPOL authentication completed - result=FAILURE | |
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/28) [s] | |
EAPOL: startWhen --> 0 | |
wlp1s0b1: Authentication with 00:3a:99:d2:64:92 timed out. | |
Added BSSID 00:3a:99:d2:64:92 into blacklist | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Request to deauthenticate - bssid=00:3a:99:d2:64:92 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED | |
TDLS: Tear down peers | |
wpa_driver_nl80211_deauthenticate(addr=00:3a:99:d2:64:92 reason_code=3) | |
wlp1s0b1: Event DEAUTH (12) received | |
wlp1s0b1: Deauthentication notification | |
wlp1s0b1: * reason 3 (locally generated) | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:99:d2:64:92 reason=3 locally_generated=1 | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED | |
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6) | |
wlp1s0b1: Setting scan request: 0.100000 sec | |
wlp1s0b1: Radio work 'sme-connect'@0x16a4b30 done in 2.059083 seconds | |
BSSID 00:3a:99:d2:64:92 blacklist count incremented to 2 | |
Continuous association failures - consider temporary network disabling | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=2 duration=32 reason=CONN_FAILED | |
wlp1s0b1: Blacklist count 10 --> request scan in 10000 ms | |
wlp1s0b1: Ignore new scan request for 10.000000 sec since an earlier request is scheduled to trigger sooner | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Disconnect event - remove keys | |
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WMM AC: WMM AC is disabled | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1 | |
nl80211: Delete station 00:3a:99:d2:64:92 | |
nl80211: Event message available | |
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:99:d2:64:92 A2=74:2f:68:d2:b1:f3 | |
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 99 d2 64 92 74 2f 68 d2 b1 f3 00 3a 99 d2 64 92 00 00 03 00 | |
nl80211: Deauthenticate event | |
nl80211: Ignore deauth event triggered due to own deauth request | |
nl80211: Event message available | |
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1 | |
nl80211: Ignore disconnect event when using userspace SME | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=0 | |
* type=1 | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=00 | |
nl80211: 2402-2472 @ 40 MHz 20 mBm | |
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR) | |
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) | |
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) | |
nl80211: 57240-63720 @ 2160 MHz 0 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=1 | |
* type=0 | |
* alpha2=BY | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=BY (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 80 MHz 20 mBm | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) | |
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS) | |
nl80211: Added 802.11b mode based on 802.11g information | |
wlp1s0b1: State: DISCONNECTED -> SCANNING | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x16a9a70 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16a9a70 after 0.000019 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000057 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.660908 seconds | |
nl80211: Received scan results (10 BSSes) | |
wlp1s0b1: BSS: Start scan result update 42 | |
wlp1s0b1: BSS: Remove id 27 BSSID 0a:27:22:d5:d3:50 SSID 'bspu public' due to no match in scan | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/27' | |
BSS: last_scan_res_used=10/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP 00:18:e7:fa:7b:45 type 0 added | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP 1c:7e:e5:3e:ad:38 type 0 added | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16a9a70 done in 0.662082 seconds | |
wlp1s0b1: Postpone network selection by 31 seconds since all networks are disabled | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/26 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/28 | |
EAPOL: disable timer tick | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv] | |
properties_get_or_set: Set(ApScan) | |
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
wpa_dbus_dict_open_read: start reading a dict entry | |
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
proactive_key_caching=1 (0x1) | |
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate | |
ENGINE: engine deinit | |
wpa_dbus_dict_get_entry: dict entry key: password | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=6): [REMOVED] | |
password - hexdump_ascii(len=6): [REMOVED] | |
wpa_dbus_dict_get_entry: dict entry key: phase1 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase1 - hexdump_ascii(len=9): | |
70 65 61 70 76 65 72 3d 30 peapver=0 | |
wpa_dbus_dict_get_entry: dict entry key: eap | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 | |
wpa_dbus_dict_get_entry: dict entry key: phase2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase2 - hexdump_ascii(len=13): | |
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 | |
wpa_dbus_dict_get_entry: dict entry key: ca_path | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=7): [REMOVED] | |
ssid - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wpa_dbus_dict_get_entry: dict entry key: key_mgmt | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
key_mgmt: 0x1 | |
wpa_dbus_dict_get_entry: dict entry key: identity | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=12): [REMOVED] | |
identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED | |
wpa_dbus_dict_get_entry: dict entry key: scan_ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
scan_ssid=1 (0x1) | |
wpa_dbus_dict_get_entry: dict entry key: fragment_size | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266 | |
fragment_size=1266 (0x4f2) | |
wpa_dbus_dict_get_entry: dict entry key: ca_path2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path2 - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: bgscan | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=17): [REMOVED] | |
bgscan - hexdump_ascii(len=17): | |
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30 | |
30 0 | |
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
Fast associate: Old scan results | |
wlp1s0b1: Setting scan request: 0.000000 sec | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x16ac150 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x16ac150 after 0.000015 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000053 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.660849 seconds | |
nl80211: Received scan results (10 BSSes) | |
wlp1s0b1: BSS: Start scan result update 43 | |
BSS: last_scan_res_used=10/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: Unknown Vendor Extension (Vendor ID 9442) | |
WPS: AP[0] 00:18:e7:fa:7b:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
WPS: AP[1] 1c:7e:e5:3e:ad:38 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 | |
wlp1s0b1: Radio work 'scan'@0x16ac150 done in 0.661840 seconds | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:98:f5:8c:f0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-42 freq=2462 | |
wlp1s0b1: skip - blacklisted (count=2 limit=0) | |
wlp1s0b1: 1: 00:3a:98:f5:8c:f1 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-43 freq=2462 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 2: 00:18:e7:fa:7b:45 ssid='256A' wpa_ie_len=26 rsn_ie_len=24 caps=0x431 level=-77 freq=2417 wps | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 3: 00:3a:99:d2:64:92 ssid='eduroam' wpa_ie_len=32 rsn_ie_len=28 caps=0x431 level=-79 freq=2412 | |
wlp1s0b1: skip - blacklisted (count=2 limit=0) | |
wlp1s0b1: 4: 28:cf:da:00:f2:f1 ssid='Point' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-80 freq=2462 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 5: 1c:7e:e5:3e:ad:38 ssid='PMS-WiFi' wpa_ie_len=26 rsn_ie_len=24 caps=0x431 level=-81 freq=2412 wps | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 6: 00:3a:9a:00:7c:42 ssid='eduroam' wpa_ie_len=32 rsn_ie_len=28 caps=0x431 level=-81 freq=2437 | |
wlp1s0b1: selected based on RSN IE | |
wlp1s0b1: selected BSS 00:3a:9a:00:7c:42 ssid='eduroam' | |
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:9a:00:7c:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x16abab0 current_ssid=0x16abab0 | |
wlp1s0b1: Request association with 00:3a:9a:00:7c:42 | |
wlp1s0b1: Add radio work 'sme-connect'@0x16ac150 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'sme-connect'@0x16ac150 after 0.000025 second wait | |
wlp1s0b1: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=0x16abab0 try_opportunistic=1 | |
RSN: Search for BSSID 00:3a:9a:00:7c:42 | |
RSN: Consider 00:3a:9a:00:7c:42 for OKC | |
RSN: No PMKSA cache entry found | |
wlp1s0b1: RSN: using IEEE 802.11i/D9.0 | |
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2 | |
wlp1s0b1: WPA: Selected mgmt group cipher 32 | |
WPA: set AP WPA IE - hexdump(len=34): dd 20 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 02 00 00 50 f2 01 00 40 96 00 00 00 | |
WPA: set AP RSN IE - hexdump(len=30): 30 1c 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 02 00 00 0f ac 01 00 40 96 00 28 00 | |
wlp1s0b1: WPA: using GTK TKIP | |
wlp1s0b1: WPA: using PTK CCMP | |
wlp1s0b1: WPA: using KEY_MGMT 802.1X | |
wlp1s0b1: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: SME: Trying to authenticate with 00:3a:9a:00:7c:42 (SSID='eduroam' freq=2437 MHz) | |
wlp1s0b1: State: SCANNING -> AUTHENTICATING | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
wlp1s0b1: Determining shared radio frequencies (max len 1) | |
wlp1s0b1: Shared frequencies (len=0): completed iteration | |
nl80211: Authenticate (ifindex=2) | |
* bssid=00:3a:9a:00:7c:42 | |
* freq=2437 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1 | |
nl80211: New station 00:3a:9a:00:7c:42 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/26 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/28 | |
nl80211: Event message available | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:9a:00:7c:42 | |
nl80211: MLME event frame - hexdump(len=30): b0 08 3a 01 74 2f 68 d2 b1 f3 00 3a 9a 00 7c 42 00 3a 9a 00 7c 42 70 35 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp1s0b1: Event AUTH (11) received | |
wlp1s0b1: SME: Authentication response: peer=00:3a:9a:00:7c:42 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp1s0b1: set_disable_max_amsdu: -1 | |
wlp1s0b1: set_ampdu_factor: -1 | |
wlp1s0b1: set_ampdu_density: -1 | |
wlp1s0b1: set_disable_ht40: 0 | |
wlp1s0b1: set_disable_sgi: 0 | |
wlp1s0b1: set_disable_ldpc: 0 | |
wlp1s0b1: Trying to associate with 00:3a:9a:00:7c:42 (SSID='eduroam' freq=2437 MHz) | |
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
nl80211: Associate (ifindex=2) | |
* bssid=00:3a:9a:00:7c:42 | |
* freq=2437 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac02 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:9a:00:7c:42 | |
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 9a 00 7c 42 00 3a 9a 00 7c 42 80 35 31 04 00 00 03 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
nl80211: Associate event | |
wlp1s0b1: Event ASSOC (0) received | |
wlp1s0b1: Association info event | |
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
wlp1s0b1: freq=2437 MHz | |
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:9a:00:7c:42 | |
wlp1s0b1: Associated with 00:3a:9a:00:7c:42 | |
wlp1s0b1: WPA: Association event - clear replay counter | |
wlp1s0b1: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: enable timer tick | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec | |
wlp1s0b1: Cancelling scan request | |
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 | |
WMM AC: U-APSD queues=0x0 | |
WMM AC: Valid WMM association, WMM AC is enabled | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
l2_packet_receive: src=00:3a:9a:00:7c:42 len=50 | |
wlp1s0b1: RX EAPOL from 00:3a:9a:00:7c:42 | |
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c 70 6f 72 74 69 64 3d 32 39 | |
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_PAE entering state RESTART | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 | |
EAP: EAP entering state IDENTITY | |
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started | |
EAP: Status notification: started (param=) | |
EAP: EAP-Request Identity data - hexdump_ascii(len=41): | |
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro | |
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c am,nasid=WiFi-A, | |
70 6f 72 74 69 64 3d 32 39 portid=29 | |
EAP: using real identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 RADIUS_USER_LOGIN_OMITTED | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:9a:00:7c:42 | |
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41 | |
EAPOL: SUPP_BE entering state RECEIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=3 | |
* type=0 | |
* alpha2=RU | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=RU (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 40 MHz 20 mBm | |
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS) | |
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS) | |
nl80211: 5735-5835 @ 40 MHz 30 mBm | |
nl80211: 57000-66000 @ 2160 MHz 40 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
l2_packet_receive: src=00:3a:9a:00:7c:42 len=10 | |
wlp1s0b1: RX EAPOL from 00:3a:9a:00:7c:42 | |
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state GET_METHOD | |
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 | |
EAP: Status notification: accept proposed method (param=PEAP) | |
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) | |
EAP-PEAP: Forced PEAP version 0 | |
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 | |
TLS: using phase1 config options | |
TLS: Trusted root certificate(s) loaded | |
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=6) - Flags 0x20 | |
EAP-PEAP: Start (server ver=0, own ver=0) | |
EAP-PEAP: Using PEAP version 0 | |
SSL: (where=0x10 ret=0x1) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:before/connect initialization | |
OpenSSL: TX ver=0x303 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x303 content_type=22 | |
OpenSSL: Message - hexdump(len=298): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:SSLv2/v3 write client hello A | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in SSLv2/v3 read server hello A | |
SSL: SSL_connect - want more data | |
SSL: 303 bytes pending from ssl_out | |
SSL: 303 bytes left to be sent out (of total 303 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x16a9840 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:9a:00:7c:42 | |
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 3e cc 3e 14 40 ac e7 72 20 9f 51 43 0b 23 24 9b 24 61 f7 2b e4 ee 09 96 f0 f0 1e 52 9c 7b 57 6f 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:9a:00:7c:42 len=8 | |
wlp1s0b1: RX EAPOL from 00:3a:9a:00:7c:42 | |
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Failure | |
EAP: Status notification: completion (param=failure) | |
EAP: EAP entering state FAILURE | |
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed | |
EAPOL: SUPP_PAE entering state HELD | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Set supplicant port unauthorized for 00:3a:9a:00:7c:42 | |
EAPOL: SUPP_BE entering state RECEIVE | |
EAPOL: SUPP_BE entering state FAIL | |
EAPOL: SUPP_BE entering state IDLE | |
EAPOL authentication completed - result=FAILURE | |
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec | |
wlp1s0b1: Removing interface wlp1s0b1 | |
wlp1s0b1: Request to deauthenticate - bssid=00:3a:9a:00:7c:42 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED | |
TDLS: Tear down peers | |
wpa_driver_nl80211_deauthenticate(addr=00:3a:9a:00:7c:42 reason_code=3) | |
wlp1s0b1: Event DEAUTH (12) received | |
wlp1s0b1: Deauthentication notification | |
wlp1s0b1: * reason 3 (locally generated) | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:9a:00:7c:42 reason=3 locally_generated=1 | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED | |
wlp1s0b1: Auto connect disabled: do not try to re-connect | |
wlp1s0b1: Radio work 'sme-connect'@0x16ac150 done in 1.875843 seconds | |
wlp1s0b1: Ignore connection failure indication since interface has been put into disconnected state | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Disconnect event - remove keys | |
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WMM AC: WMM AC is disabled | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit | |
ENGINE: engine deinit | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
Removed BSSID 00:3a:99:d2:64:92 from blacklist (clear) | |
Removed BSSID 00:3a:98:f5:8c:f0 from blacklist (clear) | |
wlp1s0b1: BSS: Remove id 0 BSSID 00:3a:98:f5:8c:f0 SSID 'eduroam' due to wpa_bss_flush | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0' | |
wlp1s0b1: BSS: Remove id 1 BSSID 00:3a:98:f5:8c:f1 SSID 'test' due to wpa_bss_flush | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1' | |
wlp1s0b1: BSS: Remove id 5 BSSID 00:18:e7:fa:7b:45 SSID '256A' due to wpa_bss_flush | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5' | |
wlp1s0b1: BSS: Remove id 2 BSSID 00:3a:99:d2:64:92 SSID 'eduroam' due to wpa_bss_flush | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2' | |
wlp1s0b1: BSS: Remove id 16 BSSID 28:cf:da:00:f2:f1 SSID 'Point' due to wpa_bss_flush | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/16' | |
wlp1s0b1: BSS: Remove id 4 BSSID 1c:7e:e5:3e:ad:38 SSID 'PMS-WiFi' due to wpa_bss_flush | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4' | |
wlp1s0b1: BSS: Remove id 26 BSSID 00:3a:9a:00:7c:42 SSID 'eduroam' due to wpa_bss_flush | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/26' | |
wlp1s0b1: BSS: Remove id 6 BSSID 00:3a:98:f5:8c:f2 SSID 'BSU-Conference' due to wpa_bss_flush | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/6' | |
wlp1s0b1: BSS: Remove id 7 BSSID 00:3a:99:d2:64:90 SSID 'BSU-Conference' due to wpa_bss_flush | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/7' | |
wlp1s0b1: BSS: Remove id 28 BSSID 50:17:ff:dc:2b:40 SSID 'BELTELECOM' due to wpa_bss_flush | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/28' | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: Cancelling authentication timeout | |
Remove interface wlp1s0b1 from radio phy0 | |
Remove radio phy0 | |
nl80211: deinit ifname=wlp1s0b1 disabled_11b_rates=0 | |
nl80211: Remove monitor interface: refcount=0 | |
netlink: Operstate: ifindex=2 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) | |
nl80211: Set mode ifindex 2 iftype 2 (STATION) | |
nl80211: Unsubscribe mgmt frames handle 0x8888888889e095f9 (mode change) | |
dbus: Unregister interface object '/fi/w1/wpa_supplicant1/Interfaces/1' | |
wlp1s0b1: CTRL-EVENT-TERMINATING | |
dbus: Unregister D-Bus object '/fi/w1/wpa_supplicant1' |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment