Skip to content

Instantly share code, notes, and snippets.

Created April 11, 2016 07:23
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save anonymous/99d68f2f05af967101a9502c96ffb8ec to your computer and use it in GitHub Desktop.
Save anonymous/99d68f2f05af967101a9502c96ffb8ec to your computer and use it in GitHub Desktop.
-- Logs begin at Wed 2016-02-17 10:27:50 MSK, end at Fri 2016-04-08 21:49:10 MSK. --
Apr 08 19:02:59 sergei_asus systemd[1]: Started WPA supplicant.
wpa_supplicant v2.5
dbus: Register D-Bus object '/fi/w1/wpa_supplicant1'
Providing DBus service 'fi.w1.wpa_supplicant1'.
Providing DBus service 'fi.epitest.hostap.WPASupplicant'.
Successfully initialized wpa_supplicant
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1) [s]
dbus: fi.w1.wpa_supplicant1.CreateInterface (/fi/w1/wpa_supplicant1) [a{sv}]
wpa_dbus_dict_open_read: start reading a dict entry
wpa_dbus_dict_get_entry: dict entry key: Driver
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
wpa_dbus_dict_get_entry: dict entry key: Ifname
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
Initializing interface 'wlp1s0b1' conf 'N/A' driver 'nl80211,wext' ctrl_interface 'N/A' bridge 'N/A'
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
rfkill: initial event: idx=2 type=1 op=0 soft=0 hard=0
rfkill: initial event: idx=3 type=2 op=0 soft=1 hard=0
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:10
nl80211: Supported cipher 00-0f-ac:8
nl80211: Supported cipher 00-0f-ac:9
nl80211: Using driver-based off-channel TX
nl80211: interface wlp1s0b1 in phy phy0
nl80211: Set mode ifindex 2 iftype 2 (STATION)
nl80211: Subscribe to mgmt frames with non-AP handle 0x1f8eff0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=040a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=040b
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=040c
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=040d
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=090a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=090b
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=090c
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=090d
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=0409506f9a09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=7f506f9a09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=0801
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=06
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=0a07
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=0a11
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=1101
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=1102
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=0505
netlink: Operstate: ifindex=2 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
nl80211: driver param='(null)'
Add interface wlp1s0b1 to a new radio phy0
nl80211: Regulatory information - country=BY (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 80 MHz 20 mBm
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS)
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS)
nl80211: Added 802.11b mode based on 802.11g information
wlp1s0b1: Own MAC address: 74:2f:68:d2:b1:f3
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
wlp1s0b1: RSN: flushing PMKID list in the driver
nl80211: Flush PMKIDs
wlp1s0b1: State: DISCONNECTED -> INACTIVE
TDLS: TDLS operation not supported by driver
TDLS: Driver uses internal link setup
TDLS: Driver does not support TDLS channel switching
wlp1s0b1: WPS: UUID based on MAC address: e909a86f-b1a7-5277-89e0-0bfd7fd694fd
ENGINE: Loading dynamic engine
ENGINE: Loading dynamic engine
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
dbus: Register interface object '/fi/w1/wpa_supplicant1/Interfaces/1'
wlp1s0b1: Added interface wlp1s0b1
wlp1s0b1: State: INACTIVE -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1) [s]
dbus: fi.w1.wpa_supplicant1.Interface.NetworkReply (/fi/w1/wpa_supplicant1/Interfaces/1) [oss]
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x1f91c60
wlp1s0b1: First radio work item in the queue - schedule start immediately
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
wlp1s0b1: Starting radio work 'scan'@0x1f91c60 after 0.000160 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 10 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000112 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.668576 seconds
nl80211: Received scan results (3 BSSes)
wlp1s0b1: BSS: Start scan result update 1
wlp1s0b1: BSS: Add new id 0 BSSID 00:3a:99:04:bf:43 SSID 'test' freq 2412
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0'
wlp1s0b1: BSS: Add new id 1 BSSID 00:3a:99:04:bf:42 SSID 'eduroam' freq 2412
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1'
wlp1s0b1: BSS: Add new id 2 BSSID 00:3a:98:f5:90:e2 SSID 'eduroam' freq 2437
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2'
BSS: last_scan_res_used=3/32
wlp1s0b1: New scan results available (own=1 ext=0)
wlp1s0b1: Radio work 'scan'@0x1f91c60 done in 0.670042 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: DISCONNECTED -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0) [s]
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1) [s]
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2) [s]
EAPOL: disable timer tick
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x1f90880
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x1f90880 after 0.000100 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000060 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.673861 seconds
nl80211: Received scan results (3 BSSes)
wlp1s0b1: BSS: Start scan result update 2
BSS: last_scan_res_used=3/32
wlp1s0b1: New scan results available (own=1 ext=0)
wlp1s0b1: Radio work 'scan'@0x1f90880 done in 0.674665 seconds
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: INACTIVE -> INACTIVE
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv]
properties_get_or_set: Set(ApScan)
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
wpa_dbus_dict_open_read: start reading a dict entry
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
proactive_key_caching=1 (0x1)
wpa_dbus_dict_get_entry: dict entry key: password
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=6): [REMOVED]
password - hexdump_ascii(len=6): [REMOVED]
wpa_dbus_dict_get_entry: dict entry key: phase1
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase1 - hexdump_ascii(len=9):
70 65 61 70 76 65 72 3d 30 peapver=0
wpa_dbus_dict_get_entry: dict entry key: eap
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
wpa_dbus_dict_get_entry: dict entry key: phase2
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
wpa_dbus_dict_get_entry: dict entry key: ca_path
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: ssid
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=7): [REMOVED]
ssid - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wpa_dbus_dict_get_entry: dict entry key: key_mgmt
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
key_mgmt: 0x1
wpa_dbus_dict_get_entry: dict entry key: identity
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=12): [REMOVED]
identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 USER_LOGIN_OMITTED
wpa_dbus_dict_get_entry: dict entry key: scan_ssid
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
scan_ssid=1 (0x1)
wpa_dbus_dict_get_entry: dict entry key: fragment_size
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266
fragment_size=1266 (0x4f2)
wpa_dbus_dict_get_entry: dict entry key: ca_path2
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path2 - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: bgscan
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=17): [REMOVED]
bgscan - hexdump_ascii(len=17):
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30
30 0
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:99:04:bf:42 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-61 freq=2412
wlp1s0b1: selected based on RSN IE
wlp1s0b1: selected BSS 00:3a:99:04:bf:42 ssid='eduroam'
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:99:04:bf:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: INACTIVE ssid=0x1fb33c0 current_ssid=0x1fb33c0
wlp1s0b1: Request association with 00:3a:99:04:bf:42
wlp1s0b1: Add radio work 'sme-connect'@0x1fb2790
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'sme-connect'@0x1fb2790 after 0.000333 second wait
wlp1s0b1: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=0x1fb33c0 try_opportunistic=1
RSN: Search for BSSID 00:3a:99:04:bf:42
RSN: Consider 00:3a:99:04:bf:42 for OKC
RSN: No PMKSA cache entry found
wlp1s0b1: RSN: using IEEE 802.11i/D9.0
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2
wlp1s0b1: WPA: Selected mgmt group cipher 32
wlp1s0b1: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00
wlp1s0b1: WPA: using GTK TKIP
wlp1s0b1: WPA: using PTK CCMP
wlp1s0b1: WPA: using KEY_MGMT 802.1X
wlp1s0b1: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp1s0b1: Cancelling scan request
wlp1s0b1: SME: Trying to authenticate with 00:3a:99:04:bf:42 (SSID='eduroam' freq=2412 MHz)
wlp1s0b1: State: INACTIVE -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlp1s0b1: Determining shared radio frequencies (max len 1)
wlp1s0b1: Shared frequencies (len=0): completed iteration
nl80211: Authenticate (ifindex=2)
* bssid=00:3a:99:04:bf:42
* freq=2412
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1
nl80211: New station 00:3a:99:04:bf:42
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:04:bf:42
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 04 bf 42 00 3a 99 04 bf 42 d0 8f 00 00 02 00 00 00
nl80211: Authenticate event
wlp1s0b1: Event AUTH (11) received
wlp1s0b1: SME: Authentication response: peer=00:3a:99:04:bf:42 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp1s0b1: set_disable_max_amsdu: -1
wlp1s0b1: set_ampdu_factor: -1
wlp1s0b1: set_ampdu_density: -1
wlp1s0b1: set_disable_ht40: 0
wlp1s0b1: set_disable_sgi: 0
wlp1s0b1: set_disable_ldpc: 0
wlp1s0b1: Trying to associate with 00:3a:99:04:bf:42 (SSID='eduroam' freq=2412 MHz)
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
nl80211: Associate (ifindex=2)
* bssid=00:3a:99:04:bf:42
* freq=2412
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac02
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:04:bf:42
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 04 bf 42 00 3a 99 04 bf 42 e0 8f 31 04 00 00 0f c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
nl80211: Associate event
wlp1s0b1: Event ASSOC (0) received
wlp1s0b1: Association info event
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
wlp1s0b1: freq=2412 MHz
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:99:04:bf:42
wlp1s0b1: Associated with 00:3a:99:04:bf:42
wlp1s0b1: WPA: Association event - clear replay counter
wlp1s0b1: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec
wlp1s0b1: Cancelling scan request
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1
nl80211: Ignore connect event (cmd=46) when using userspace SME
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
l2_packet_receive: src=00:3a:99:04:bf:42 len=50
wlp1s0b1: RX EAPOL from 00:3a:99:04:bf:42
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c 70 6f 72 74 69 64 3d 32 39
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=41):
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c am,nasid=WiFi-B,
70 6f 72 74 69 64 3d 32 39 portid=29
EAP: using real identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 USER_LOGIN_OMITTED
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:99:04:bf:42
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41
EAPOL: SUPP_BE entering state RECEIVE
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=3
* type=0
* alpha2=RU
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=RU (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 40 MHz 20 mBm
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS)
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS)
nl80211: 5735-5835 @ 40 MHz 30 mBm
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
l2_packet_receive: src=00:3a:99:04:bf:42 len=10
wlp1s0b1: RX EAPOL from 00:3a:99:04:bf:42
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Status notification: accept proposed method (param=PEAP)
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
EAP-PEAP: Forced PEAP version 0
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
TLS: Trusted root certificate(s) loaded
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=0)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
OpenSSL: TX ver=0x303 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x303 content_type=22
OpenSSL: Message - hexdump(len=298): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv2/v3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv2/v3 read server hello A
SSL: SSL_connect - want more data
SSL: 303 bytes pending from ssl_out
SSL: 303 bytes left to be sent out (of total 303 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1fb55a0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:99:04:bf:42
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 88 89 41 3b f9 79 ac 95 f6 d4 13 85 b9 de 3c e0 e9 35 37 32 04 1c d7 a6 64 66 55 03 fa b1 73 6a 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:99:04:bf:42 len=8
wlp1s0b1: RX EAPOL from 00:3a:99:04:bf:42
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: Status notification: completion (param=failure)
EAP: EAP entering state FAILURE
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:3a:99:04:bf:42
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed - result=FAILURE
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec
EAPOL: startWhen --> 0
wlp1s0b1: Authentication with 00:3a:99:04:bf:42 timed out.
Added BSSID 00:3a:99:04:bf:42 into blacklist
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Request to deauthenticate - bssid=00:3a:99:04:bf:42 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED
TDLS: Tear down peers
wpa_driver_nl80211_deauthenticate(addr=00:3a:99:04:bf:42 reason_code=3)
wlp1s0b1: Event DEAUTH (12) received
wlp1s0b1: Deauthentication notification
wlp1s0b1: * reason 3 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:99:04:bf:42 reason=3 locally_generated=1
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6)
wlp1s0b1: Setting scan request: 0.100000 sec
wlp1s0b1: Radio work 'sme-connect'@0x1fb2790 done in 2.041640 seconds
BSSID 00:3a:99:04:bf:42 blacklist count incremented to 2
wlp1s0b1: Blacklist count 2 --> request scan in 500 ms
wlp1s0b1: Ignore new scan request for 0.500000 sec since an earlier request is scheduled to trigger sooner
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Disconnect event - remove keys
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1
nl80211: Delete station 00:3a:99:04:bf:42
nl80211: Event message available
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:99:04:bf:42 A2=74:2f:68:d2:b1:f3
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 99 04 bf 42 74 2f 68 d2 b1 f3 00 3a 99 04 bf 42 00 00 03 00
nl80211: Deauthenticate event
nl80211: Ignore deauth event triggered due to own deauth request
nl80211: Event message available
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1
nl80211: Ignore disconnect event when using userspace SME
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=0
* type=1
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=1
* type=0
* alpha2=BY
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=BY (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 80 MHz 20 mBm
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS)
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS)
nl80211: Added 802.11b mode based on 802.11g information
wlp1s0b1: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x1fb2790
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x1fb2790 after 0.000020 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000059 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.682812 seconds
nl80211: Received scan results (3 BSSes)
wlp1s0b1: BSS: Start scan result update 3
BSS: last_scan_res_used=3/32
wlp1s0b1: New scan results available (own=1 ext=0)
wlp1s0b1: Radio work 'scan'@0x1fb2790 done in 0.683535 seconds
wlp1s0b1: Postpone network selection by 9 seconds since all networks are disabled
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
EAPOL: disable timer tick
wlp1s0b1: Try to associate due to network getting re-enabled
Fast associate: Old scan results
wlp1s0b1: Setting scan request: 0.000000 sec
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x1fb2790
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x1fb2790 after 0.000017 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000060 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.701427 seconds
nl80211: Received scan results (3 BSSes)
wlp1s0b1: BSS: Start scan result update 4
BSS: last_scan_res_used=3/32
wlp1s0b1: New scan results available (own=1 ext=0)
wlp1s0b1: Radio work 'scan'@0x1fb2790 done in 0.702208 seconds
wlp1s0b1: CTRL-EVENT-SSID-REENABLED id=0 ssid="eduroam"
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:99:04:bf:42 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-63 freq=2412
wlp1s0b1: skip - blacklisted (count=2 limit=0)
wlp1s0b1: 1: 00:3a:99:04:bf:43 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-64 freq=2412
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 2: 00:3a:98:f5:90:e2 ssid='eduroam' wpa_ie_len=32 rsn_ie_len=28 caps=0x431 level=-83 freq=2437
wlp1s0b1: selected based on RSN IE
wlp1s0b1: selected BSS 00:3a:98:f5:90:e2 ssid='eduroam'
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:98:f5:90:e2 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x1fb33c0 current_ssid=(nil)
wlp1s0b1: Request association with 00:3a:98:f5:90:e2
wlp1s0b1: Re-association to the same ESS
wlp1s0b1: Add radio work 'sme-connect'@0x1fb2790
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'sme-connect'@0x1fb2790 after 0.000029 second wait
wlp1s0b1: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=1
RSN: Search for BSSID 00:3a:98:f5:90:e2
RSN: Consider 00:3a:98:f5:90:e2 for OKC
RSN: No PMKSA cache entry found
wlp1s0b1: RSN: using IEEE 802.11i/D9.0
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2
wlp1s0b1: WPA: Selected mgmt group cipher 32
WPA: set AP WPA IE - hexdump(len=34): dd 20 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 02 00 00 50 f2 01 00 40 96 00 00 00
WPA: set AP RSN IE - hexdump(len=30): 30 1c 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 02 00 00 0f ac 01 00 40 96 00 28 00
wlp1s0b1: WPA: using GTK TKIP
wlp1s0b1: WPA: using PTK CCMP
wlp1s0b1: WPA: using KEY_MGMT 802.1X
wlp1s0b1: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp1s0b1: Cancelling scan request
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz)
wlp1s0b1: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlp1s0b1: Determining shared radio frequencies (max len 1)
wlp1s0b1: Shared frequencies (len=0): completed iteration
nl80211: Authenticate (ifindex=2)
* bssid=00:3a:98:f5:90:e2
* freq=2437
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1
nl80211: New station 00:3a:98:f5:90:e2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1
nl80211: Delete station 00:3a:98:f5:90:e2
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 37; timeout with 00:3a:98:f5:90:e2
wlp1s0b1: Event AUTH_TIMED_OUT (14) received
wlp1s0b1: SME: Authentication timed out
wlp1s0b1: Radio work 'sme-connect'@0x1fb2790 done in 0.360956 seconds
Added BSSID 00:3a:98:f5:90:e2 into blacklist
wlp1s0b1: Blacklist count 1 --> request scan in 100 ms
wlp1s0b1: Setting scan request: 0.100000 sec
wlp1s0b1: State: AUTHENTICATING -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
wlp1s0b1: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x1fb2790
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x1fb2790 after 0.000021 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000060 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.697508 seconds
nl80211: Received scan results (2 BSSes)
wlp1s0b1: BSS: Start scan result update 5
BSS: last_scan_res_used=2/32
wlp1s0b1: New scan results available (own=1 ext=0)
wlp1s0b1: Radio work 'scan'@0x1fb2790 done in 0.698231 seconds
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:99:04:bf:42 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-62 freq=2412
wlp1s0b1: skip - blacklisted (count=2 limit=0)
wlp1s0b1: 1: 00:3a:99:04:bf:43 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-64 freq=2412
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: No APs found - clear blacklist and try again
Removed BSSID 00:3a:98:f5:90:e2 from blacklist (clear)
Removed BSSID 00:3a:99:04:bf:42 from blacklist (clear)
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:99:04:bf:42 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-62 freq=2412
wlp1s0b1: selected based on RSN IE
wlp1s0b1: selected BSS 00:3a:99:04:bf:42 ssid='eduroam'
wlp1s0b1: Considering connect request: reassociate: 0 selected: 00:3a:99:04:bf:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x1fb33c0 current_ssid=(nil)
wlp1s0b1: Request association with 00:3a:99:04:bf:42
wlp1s0b1: Re-association to the same ESS
wlp1s0b1: Add radio work 'sme-connect'@0x1fb2790
wlp1s0b1: First radio work item in the queue - schedule start immediately
RSN: Consider 00:3a:98:f5:90:e2 for OKC
RSN: Ignored PMKID candidate without preauth flag
wlp1s0b1: Starting radio work 'sme-connect'@0x1fb2790 after 0.000045 second wait
wlp1s0b1: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=1
RSN: Search for BSSID 00:3a:99:04:bf:42
RSN: Consider 00:3a:99:04:bf:42 for OKC
RSN: No PMKSA cache entry found
wlp1s0b1: RSN: using IEEE 802.11i/D9.0
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2
wlp1s0b1: WPA: Selected mgmt group cipher 32
wlp1s0b1: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00
wlp1s0b1: WPA: using GTK TKIP
wlp1s0b1: WPA: using PTK CCMP
wlp1s0b1: WPA: using KEY_MGMT 802.1X
wlp1s0b1: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp1s0b1: Cancelling scan request
wlp1s0b1: SME: Trying to authenticate with 00:3a:99:04:bf:42 (SSID='eduroam' freq=2412 MHz)
wlp1s0b1: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlp1s0b1: Determining shared radio frequencies (max len 1)
wlp1s0b1: Shared frequencies (len=0): completed iteration
nl80211: Authenticate (ifindex=2)
* bssid=00:3a:99:04:bf:42
* freq=2412
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1
nl80211: New station 00:3a:99:04:bf:42
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:04:bf:42
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 04 bf 42 00 3a 99 04 bf 42 f0 a4 00 00 02 00 00 00
nl80211: Authenticate event
wlp1s0b1: Event AUTH (11) received
wlp1s0b1: SME: Authentication response: peer=00:3a:99:04:bf:42 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp1s0b1: set_disable_max_amsdu: -1
wlp1s0b1: set_ampdu_factor: -1
wlp1s0b1: set_ampdu_density: -1
wlp1s0b1: set_disable_ht40: 0
wlp1s0b1: set_disable_sgi: 0
wlp1s0b1: set_disable_ldpc: 0
wlp1s0b1: Trying to associate with 00:3a:99:04:bf:42 (SSID='eduroam' freq=2412 MHz)
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
nl80211: Associate (ifindex=2)
* bssid=00:3a:99:04:bf:42
* freq=2412
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac02
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
l2_packet_receive: src=00:3a:99:04:bf:42 len=50
wlp1s0b1: RX EAPOL from 00:3a:99:04:bf:42
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c 70 6f 72 74 69 64 3d 32 39
wlp1s0b1: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00)
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:04:bf:42
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 04 bf 42 00 3a 99 04 bf 42 10 a5 31 04 00 00 0f c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
nl80211: Associate event
wlp1s0b1: Event ASSOC (0) received
wlp1s0b1: Association info event
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
wlp1s0b1: freq=2412 MHz
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:99:04:bf:42
wlp1s0b1: Associated with 00:3a:99:04:bf:42
wlp1s0b1: WPA: Association event - clear replay counter
wlp1s0b1: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE
ENGINE: engine deinit
EAP: EAP entering state IDLE
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec
wlp1s0b1: Cancelling scan request
wlp1s0b1: Process pending EAPOL frame that was received just before association notification
wlp1s0b1: RX EAPOL from 00:3a:99:04:bf:42
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c 70 6f 72 74 69 64 3d 32 39
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=41):
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c am,nasid=WiFi-B,
70 6f 72 74 69 64 3d 32 39 portid=29
EAP: using real identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 USER_LOGIN_OMITTED
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:99:04:bf:42
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41
EAPOL: SUPP_BE entering state RECEIVE
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
nl80211: Event message available
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1
nl80211: Ignore connect event (cmd=46) when using userspace SME
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=3
* type=0
* alpha2=RU
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=RU (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 40 MHz 20 mBm
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS)
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS)
nl80211: 5735-5835 @ 40 MHz 30 mBm
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
l2_packet_receive: src=00:3a:99:04:bf:42 len=10
wlp1s0b1: RX EAPOL from 00:3a:99:04:bf:42
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Status notification: accept proposed method (param=PEAP)
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
EAP-PEAP: Forced PEAP version 0
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
TLS: Trusted root certificate(s) loaded
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=0)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
OpenSSL: TX ver=0x303 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x303 content_type=22
OpenSSL: Message - hexdump(len=298): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv2/v3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv2/v3 read server hello A
SSL: SSL_connect - want more data
SSL: 303 bytes pending from ssl_out
SSL: 303 bytes left to be sent out (of total 303 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1fb5460
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:99:04:bf:42
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 d4 a5 0b 32 eb 1e be 48 bb 10 0e 09 b3 07 55 18 0e 30 33 0f 9c 8f 0d 4d 59 fb 5d aa 42 23 f9 ce 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:99:04:bf:42 len=8
wlp1s0b1: RX EAPOL from 00:3a:99:04:bf:42
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: Status notification: completion (param=failure)
EAP: EAP entering state FAILURE
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:3a:99:04:bf:42
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed - result=FAILURE
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec
EAPOL: startWhen --> 0
wlp1s0b1: Authentication with 00:3a:99:04:bf:42 timed out.
Added BSSID 00:3a:99:04:bf:42 into blacklist
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Request to deauthenticate - bssid=00:3a:99:04:bf:42 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED
TDLS: Tear down peers
wpa_driver_nl80211_deauthenticate(addr=00:3a:99:04:bf:42 reason_code=3)
wlp1s0b1: Event DEAUTH (12) received
wlp1s0b1: Deauthentication notification
wlp1s0b1: * reason 3 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:99:04:bf:42 reason=3 locally_generated=1
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=2 duration=23 reason=AUTH_FAILED
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6)
wlp1s0b1: Setting scan request: 0.100000 sec
wlp1s0b1: Radio work 'sme-connect'@0x1fb2790 done in 2.052209 seconds
BSSID 00:3a:99:04:bf:42 blacklist count incremented to 2
Continuous association failures - consider temporary network disabling
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=3 duration=46 reason=CONN_FAILED
wlp1s0b1: Blacklist count 4 --> request scan in 5000 ms
wlp1s0b1: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Disconnect event - remove keys
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1
nl80211: Delete station 00:3a:99:04:bf:42
nl80211: Event message available
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:99:04:bf:42 A2=74:2f:68:d2:b1:f3
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 99 04 bf 42 74 2f 68 d2 b1 f3 00 3a 99 04 bf 42 00 00 03 00
nl80211: Deauthenticate event
nl80211: Ignore deauth event triggered due to own deauth request
nl80211: Event message available
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1
nl80211: Ignore disconnect event when using userspace SME
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=0
* type=1
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=1
* type=0
* alpha2=BY
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=BY (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 80 MHz 20 mBm
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS)
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS)
nl80211: Added 802.11b mode based on 802.11g information
wlp1s0b1: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x1fb3360
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x1fb3360 after 0.000020 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000059 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.699782 seconds
nl80211: Received scan results (2 BSSes)
wlp1s0b1: BSS: Start scan result update 6
wlp1s0b1: BSS: Remove id 2 BSSID 00:3a:98:f5:90:e2 SSID 'eduroam' due to no match in scan
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2'
BSS: last_scan_res_used=2/32
wlp1s0b1: New scan results available (own=1 ext=0)
wlp1s0b1: Radio work 'scan'@0x1fb3360 done in 0.700606 seconds
wlp1s0b1: Postpone network selection by 45 seconds since all networks are disabled
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
EAPOL: disable timer tick
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv]
properties_get_or_set: Set(ApScan)
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
wpa_dbus_dict_open_read: start reading a dict entry
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
proactive_key_caching=1 (0x1)
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate
ENGINE: engine deinit
wpa_dbus_dict_get_entry: dict entry key: password
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=6): [REMOVED]
password - hexdump_ascii(len=6): [REMOVED]
wpa_dbus_dict_get_entry: dict entry key: phase1
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase1 - hexdump_ascii(len=9):
70 65 61 70 76 65 72 3d 30 peapver=0
wpa_dbus_dict_get_entry: dict entry key: eap
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
wpa_dbus_dict_get_entry: dict entry key: phase2
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
wpa_dbus_dict_get_entry: dict entry key: ca_path
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: ssid
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=7): [REMOVED]
ssid - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wpa_dbus_dict_get_entry: dict entry key: key_mgmt
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
key_mgmt: 0x1
wpa_dbus_dict_get_entry: dict entry key: identity
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=12): [REMOVED]
identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 USER_LOGIN_OMITTED
wpa_dbus_dict_get_entry: dict entry key: scan_ssid
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
scan_ssid=1 (0x1)
wpa_dbus_dict_get_entry: dict entry key: fragment_size
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266
fragment_size=1266 (0x4f2)
wpa_dbus_dict_get_entry: dict entry key: ca_path2
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path2 - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: bgscan
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=17): [REMOVED]
bgscan - hexdump_ascii(len=17):
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30
30 0
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
Fast associate: Old scan results
wlp1s0b1: Setting scan request: 0.000000 sec
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x1fb0e80
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x1fb0e80 after 0.000016 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000058 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.667589 seconds
nl80211: Received scan results (2 BSSes)
wlp1s0b1: BSS: Start scan result update 7
BSS: last_scan_res_used=2/32
wlp1s0b1: New scan results available (own=1 ext=0)
wlp1s0b1: Radio work 'scan'@0x1fb0e80 done in 0.668313 seconds
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:99:04:bf:42 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-62 freq=2412
wlp1s0b1: skip - blacklisted (count=2 limit=0)
wlp1s0b1: 1: 00:3a:99:04:bf:43 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-62 freq=2412
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: No APs found - clear blacklist and try again
Removed BSSID 00:3a:99:04:bf:42 from blacklist (clear)
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:99:04:bf:42 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-62 freq=2412
wlp1s0b1: selected based on RSN IE
wlp1s0b1: selected BSS 00:3a:99:04:bf:42 ssid='eduroam'
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:99:04:bf:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x1fb3360 current_ssid=0x1fb3360
wlp1s0b1: Request association with 00:3a:99:04:bf:42
wlp1s0b1: Add radio work 'sme-connect'@0x1fb0e80
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'sme-connect'@0x1fb0e80 after 0.000027 second wait
wlp1s0b1: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=0x1fb3360 try_opportunistic=1
RSN: Search for BSSID 00:3a:99:04:bf:42
RSN: Consider 00:3a:99:04:bf:42 for OKC
RSN: No PMKSA cache entry found
wlp1s0b1: RSN: using IEEE 802.11i/D9.0
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2
wlp1s0b1: WPA: Selected mgmt group cipher 32
wlp1s0b1: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00
wlp1s0b1: WPA: using GTK TKIP
wlp1s0b1: WPA: using PTK CCMP
wlp1s0b1: WPA: using KEY_MGMT 802.1X
wlp1s0b1: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp1s0b1: Cancelling scan request
wlp1s0b1: SME: Trying to authenticate with 00:3a:99:04:bf:42 (SSID='eduroam' freq=2412 MHz)
wlp1s0b1: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlp1s0b1: Determining shared radio frequencies (max len 1)
wlp1s0b1: Shared frequencies (len=0): completed iteration
nl80211: Authenticate (ifindex=2)
* bssid=00:3a:99:04:bf:42
* freq=2412
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1
nl80211: New station 00:3a:99:04:bf:42
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:04:bf:42
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 04 bf 42 00 3a 99 04 bf 42 b0 bc 00 00 02 00 00 00
nl80211: Authenticate event
wlp1s0b1: Event AUTH (11) received
wlp1s0b1: SME: Authentication response: peer=00:3a:99:04:bf:42 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp1s0b1: set_disable_max_amsdu: -1
wlp1s0b1: set_ampdu_factor: -1
wlp1s0b1: set_ampdu_density: -1
wlp1s0b1: set_disable_ht40: 0
wlp1s0b1: set_disable_sgi: 0
wlp1s0b1: set_disable_ldpc: 0
wlp1s0b1: Trying to associate with 00:3a:99:04:bf:42 (SSID='eduroam' freq=2412 MHz)
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
nl80211: Associate (ifindex=2)
* bssid=00:3a:99:04:bf:42
* freq=2412
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac02
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
nl80211: Event message available
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:04:bf:42
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 04 bf 42 00 3a 99 04 bf 42 c0 bc 31 04 00 00 0f c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
nl80211: Associate event
wlp1s0b1: Event ASSOC (0) received
wlp1s0b1: Association info event
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
wlp1s0b1: freq=2412 MHz
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:99:04:bf:42
wlp1s0b1: Associated with 00:3a:99:04:bf:42
wlp1s0b1: WPA: Association event - clear replay counter
wlp1s0b1: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec
wlp1s0b1: Cancelling scan request
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1
nl80211: Ignore connect event (cmd=46) when using userspace SME
l2_packet_receive: src=00:3a:99:04:bf:42 len=50
wlp1s0b1: RX EAPOL from 00:3a:99:04:bf:42
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c 70 6f 72 74 69 64 3d 32 39
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=41):
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c am,nasid=WiFi-B,
70 6f 72 74 69 64 3d 32 39 portid=29
EAP: using real identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 USER_LOGIN_OMITTED
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:99:04:bf:42
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41
EAPOL: SUPP_BE entering state RECEIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=3
* type=0
* alpha2=RU
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=RU (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 40 MHz 20 mBm
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS)
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS)
nl80211: 5735-5835 @ 40 MHz 30 mBm
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
l2_packet_receive: src=00:3a:99:04:bf:42 len=10
wlp1s0b1: RX EAPOL from 00:3a:99:04:bf:42
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Status notification: accept proposed method (param=PEAP)
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
EAP-PEAP: Forced PEAP version 0
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
TLS: Trusted root certificate(s) loaded
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=0)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
OpenSSL: TX ver=0x303 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x303 content_type=22
OpenSSL: Message - hexdump(len=298): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv2/v3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv2/v3 read server hello A
SSL: SSL_connect - want more data
SSL: 303 bytes pending from ssl_out
SSL: 303 bytes left to be sent out (of total 303 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1fb7040
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:99:04:bf:42
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 3e 21 6d 45 cc e0 53 80 cd 27 8a e9 a9 93 07 0f f8 6e af 61 fc 27 2c 2f 55 2d f6 ca 5e f6 09 c3 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:99:04:bf:42 len=8
wlp1s0b1: RX EAPOL from 00:3a:99:04:bf:42
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: Status notification: completion (param=failure)
EAP: EAP entering state FAILURE
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:3a:99:04:bf:42
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed - result=FAILURE
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec
EAPOL: startWhen --> 0
wlp1s0b1: Authentication with 00:3a:99:04:bf:42 timed out.
Added BSSID 00:3a:99:04:bf:42 into blacklist
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Request to deauthenticate - bssid=00:3a:99:04:bf:42 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED
TDLS: Tear down peers
wpa_driver_nl80211_deauthenticate(addr=00:3a:99:04:bf:42 reason_code=3)
wlp1s0b1: Event DEAUTH (12) received
wlp1s0b1: Deauthentication notification
wlp1s0b1: * reason 3 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:99:04:bf:42 reason=3 locally_generated=1
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6)
wlp1s0b1: Setting scan request: 0.100000 sec
wlp1s0b1: Radio work 'sme-connect'@0x1fb0e80 done in 2.046081 seconds
BSSID 00:3a:99:04:bf:42 blacklist count incremented to 2
Continuous association failures - consider temporary network disabling
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=2 duration=37 reason=CONN_FAILED
wlp1s0b1: Blacklist count 6 --> request scan in 10000 ms
wlp1s0b1: Ignore new scan request for 10.000000 sec since an earlier request is scheduled to trigger sooner
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Disconnect event - remove keys
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1
nl80211: Delete station 00:3a:99:04:bf:42
nl80211: Event message available
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:99:04:bf:42 A2=74:2f:68:d2:b1:f3
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 99 04 bf 42 74 2f 68 d2 b1 f3 00 3a 99 04 bf 42 00 00 03 00
nl80211: Deauthenticate event
nl80211: Ignore deauth event triggered due to own deauth request
nl80211: Event message available
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1
nl80211: Ignore disconnect event when using userspace SME
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=0
* type=1
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=1
* type=0
* alpha2=BY
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=BY (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 80 MHz 20 mBm
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS)
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS)
nl80211: Added 802.11b mode based on 802.11g information
wlp1s0b1: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x1fbca30
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x1fbca30 after 0.000019 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000060 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.675923 seconds
nl80211: Received scan results (4 BSSes)
wlp1s0b1: BSS: Start scan result update 8
wlp1s0b1: BSS: Add new id 3 BSSID 00:3a:98:f5:90:e2 SSID 'eduroam' freq 2437
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3'
wlp1s0b1: BSS: Add new id 4 BSSID 00:3a:99:d2:61:60 SSID 'BSU-Conference' freq 2462
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4'
BSS: last_scan_res_used=4/32
wlp1s0b1: New scan results available (own=1 ext=0)
wlp1s0b1: Radio work 'scan'@0x1fbca30 done in 0.677011 seconds
wlp1s0b1: Postpone network selection by 36 seconds since all networks are disabled
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3) [s]
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4) [s]
EAPOL: disable timer tick
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv]
properties_get_or_set: Set(ApScan)
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
wpa_dbus_dict_open_read: start reading a dict entry
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
proactive_key_caching=1 (0x1)
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate
ENGINE: engine deinit
wpa_dbus_dict_get_entry: dict entry key: password
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=6): [REMOVED]
password - hexdump_ascii(len=6): [REMOVED]
wpa_dbus_dict_get_entry: dict entry key: phase1
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase1 - hexdump_ascii(len=9):
70 65 61 70 76 65 72 3d 30 peapver=0
wpa_dbus_dict_get_entry: dict entry key: eap
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
wpa_dbus_dict_get_entry: dict entry key: phase2
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
wpa_dbus_dict_get_entry: dict entry key: ca_path
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: ssid
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=7): [REMOVED]
ssid - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wpa_dbus_dict_get_entry: dict entry key: key_mgmt
wpa_dbus_dict_get_entry: dict entry variant content type: s
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted]
key_mgmt: 0x1
wpa_dbus_dict_get_entry: dict entry key: identity
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=12): [REMOVED]
identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 USER_LOGIN_OMITTED
wpa_dbus_dict_get_entry: dict entry key: scan_ssid
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1
scan_ssid=1 (0x1)
wpa_dbus_dict_get_entry: dict entry key: fragment_size
wpa_dbus_dict_get_entry: dict entry variant content type: i
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266
fragment_size=1266 (0x4f2)
wpa_dbus_dict_get_entry: dict entry key: ca_path2
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=14): [REMOVED]
ca_path2 - hexdump_ascii(len=14):
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs
wpa_dbus_dict_get_entry: dict entry key: bgscan
wpa_dbus_dict_get_entry: dict entry variant content type: a
_wpa_dbus_dict_entry_get_array: array_type y
dbus: byte array contents - hexdump(len=17): [REMOVED]
bgscan - hexdump_ascii(len=17):
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30
30 0
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
Fast associate: Old scan results
wlp1s0b1: Setting scan request: 0.000000 sec
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x1faeff0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x1faeff0 after 0.000016 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000059 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.659433 seconds
nl80211: Received scan results (4 BSSes)
wlp1s0b1: BSS: Start scan result update 9
BSS: last_scan_res_used=4/32
wlp1s0b1: New scan results available (own=1 ext=0)
wlp1s0b1: Radio work 'scan'@0x1faeff0 done in 0.660239 seconds
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:99:04:bf:42 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-61 freq=2412
wlp1s0b1: skip - blacklisted (count=2 limit=0)
wlp1s0b1: 1: 00:3a:99:04:bf:43 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-62 freq=2412
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 2: 00:3a:98:f5:90:e2 ssid='eduroam' wpa_ie_len=32 rsn_ie_len=28 caps=0x431 level=-82 freq=2437
wlp1s0b1: selected based on RSN IE
wlp1s0b1: selected BSS 00:3a:98:f5:90:e2 ssid='eduroam'
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:98:f5:90:e2 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x1fbbe20 current_ssid=0x1fbbe20
wlp1s0b1: Request association with 00:3a:98:f5:90:e2
wlp1s0b1: Add radio work 'sme-connect'@0x1faeff0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'sme-connect'@0x1faeff0 after 0.000031 second wait
wlp1s0b1: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=0x1fbbe20 try_opportunistic=1
RSN: Search for BSSID 00:3a:98:f5:90:e2
RSN: Consider 00:3a:98:f5:90:e2 for OKC
RSN: No PMKSA cache entry found
wlp1s0b1: RSN: using IEEE 802.11i/D9.0
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2
wlp1s0b1: WPA: Selected mgmt group cipher 32
WPA: set AP WPA IE - hexdump(len=34): dd 20 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 02 00 00 50 f2 01 00 40 96 00 00 00
WPA: set AP RSN IE - hexdump(len=30): 30 1c 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 02 00 00 0f ac 01 00 40 96 00 28 00
wlp1s0b1: WPA: using GTK TKIP
wlp1s0b1: WPA: using PTK CCMP
wlp1s0b1: WPA: using KEY_MGMT 802.1X
wlp1s0b1: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp1s0b1: Cancelling scan request
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz)
wlp1s0b1: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlp1s0b1: Determining shared radio frequencies (max len 1)
wlp1s0b1: Shared frequencies (len=0): completed iteration
nl80211: Authenticate (ifindex=2)
* bssid=00:3a:98:f5:90:e2
* freq=2437
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1
nl80211: New station 00:3a:98:f5:90:e2
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 3a 98 f5 90 e2 e0 63 00 00 02 00 00 00
nl80211: Authenticate event
wlp1s0b1: Event AUTH (11) received
wlp1s0b1: SME: Authentication response: peer=00:3a:98:f5:90:e2 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp1s0b1: set_disable_max_amsdu: -1
wlp1s0b1: set_ampdu_factor: -1
wlp1s0b1: set_ampdu_density: -1
wlp1s0b1: set_disable_ht40: 0
wlp1s0b1: set_disable_sgi: 0
wlp1s0b1: set_disable_ldpc: 0
wlp1s0b1: Trying to associate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz)
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
nl80211: Associate (ifindex=2)
* bssid=00:3a:98:f5:90:e2
* freq=2437
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac02
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 3a 98 f5 90 e2 30 64 31 04 00 00 bc c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
nl80211: Associate event
wlp1s0b1: Event ASSOC (0) received
wlp1s0b1: Association info event
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
wlp1s0b1: freq=2437 MHz
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:98:f5:90:e2
wlp1s0b1: Associated with 00:3a:98:f5:90:e2
wlp1s0b1: WPA: Association event - clear replay counter
wlp1s0b1: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec
wlp1s0b1: Cancelling scan request
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
nl80211: Event message available
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1
nl80211: Ignore connect event (cmd=46) when using userspace SME
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=3
* type=0
* alpha2=RU
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=RU (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 40 MHz 20 mBm
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS)
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS)
nl80211: 5735-5835 @ 40 MHz 30 mBm
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
l2_packet_receive: src=00:3a:98:f5:90:e2 len=50
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c 70 6f 72 74 69 64 3d 32 39
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=41):
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c am,nasid=WiFi-A,
70 6f 72 74 69 64 3d 32 39 portid=29
EAP: using real identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 USER_LOGIN_OMITTED
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:90:e2
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:90:e2 len=10
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Status notification: accept proposed method (param=PEAP)
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
EAP-PEAP: Forced PEAP version 0
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
TLS: Trusted root certificate(s) loaded
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=0)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
OpenSSL: TX ver=0x303 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x303 content_type=22
OpenSSL: Message - hexdump(len=298): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv2/v3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv2/v3 read server hello A
SSL: SSL_connect - want more data
SSL: 303 bytes pending from ssl_out
SSL: 303 bytes left to be sent out (of total 303 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1fb5de0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:90:e2
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 2a 65 7b 21 f7 76 64 ae 5d 0d fa 55 b6 58 a4 78 ce 70 53 7b d2 24 38 33 84 5d 8d 39 97 b8 2d b2 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
nl80211: Event message available
nl80211: Drv Event 64 (NL80211_CMD_NOTIFY_CQM) received for wlp1s0b1
nl80211: Event message available
nl80211: Drv Event 64 (NL80211_CMD_NOTIFY_CQM) received for wlp1s0b1
nl80211: Event message available
nl80211: Drv Event 64 (NL80211_CMD_NOTIFY_CQM) received for wlp1s0b1
nl80211: Event message available
nl80211: Drv Event 64 (NL80211_CMD_NOTIFY_CQM) received for wlp1s0b1
nl80211: Event message available
nl80211: Drv Event 64 (NL80211_CMD_NOTIFY_CQM) received for wlp1s0b1
nl80211: Event message available
nl80211: Drv Event 64 (NL80211_CMD_NOTIFY_CQM) received for wlp1s0b1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1
nl80211: Delete station 00:3a:98:f5:90:e2
nl80211: Event message available
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:98:f5:90:e2 A2=74:2f:68:d2:b1:f3
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 98 f5 90 e2 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 00 04 00
nl80211: Deauthenticate event
wlp1s0b1: Event DEAUTH (12) received
wlp1s0b1: Deauthentication notification
wlp1s0b1: * reason 4 (locally generated)
wlp1s0b1: * address 00:3a:98:f5:90:e2
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:98:f5:90:e2 reason=4 locally_generated=1
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6)
wlp1s0b1: Setting scan request: 0.100000 sec
wlp1s0b1: Radio work 'sme-connect'@0x1faeff0 done in 22.468515 seconds
Added BSSID 00:3a:98:f5:90:e2 into blacklist
Continuous association failures - consider temporary network disabling
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=CONN_FAILED
wlp1s0b1: Blacklist count 5 --> request scan in 10000 ms
wlp1s0b1: Ignore new scan request for 10.000000 sec since an earlier request is scheduled to trigger sooner
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Disconnect event - remove keys
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
nl80211: Event message available
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1
nl80211: Ignore disconnect event when using userspace SME
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=0
* type=1
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Event message available
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1
nl80211: Regulatory domain change
* initiator=1
* type=0
* alpha2=BY
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY
wlp1s0b1: Updating hw mode
nl80211: Regulatory information - country=BY (DFS-ETSI)
nl80211: 2402-2482 @ 40 MHz 20 mBm
nl80211: 5170-5250 @ 80 MHz 20 mBm
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS)
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS)
nl80211: Added 802.11b mode based on 802.11g information
wlp1s0b1: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x1fb2e60
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x1fb2e60 after 0.000021 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000061 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
EAPOL: disable timer tick
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID 'eduroam'
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.676683 seconds
nl80211: Received scan results (3 BSSes)
wlp1s0b1: BSS: Start scan result update 10
BSS: last_scan_res_used=3/32
wlp1s0b1: New scan results available (own=1 ext=0)
wlp1s0b1: Radio work 'scan'@0x1fb2e60 done in 0.677391 seconds
wlp1s0b1: Postpone network selection by 9 seconds since all networks are disabled
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o]
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0'
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) []
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}]
wlp1s0b1: Add radio work 'scan'@0x1fb2410
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x1fb2410 after 0.000099 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan SSID - hexdump_ascii(len=11):
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus
nl80211: Scan SSID - hexdump_ascii(len=13):
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000062 seconds
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan probed for SSID 'sergei_asus'
nl80211: Scan probed for SSID 'sergei_galaxy'
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.686140 seconds
nl80211: Received scan results (3 BSSes)
wlp1s0b1: BSS: Start scan result update 11
wlp1s0b1: BSS: Remove id 4 BSSID 00:3a:99:d2:61:60 SSID 'BSU-Conference' due to no match in scan
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4'
BSS: last_scan_res_used=3/32
wlp1s0b1: New scan results available (own=1 ext=0)
wlp1s0b1: Radio work 'scan'@0x1fb2410 done in 0.686916 seconds
wlp1s0b1: No APs found - clear blacklist and try again
Removed BSSID 00:3a:98:f5:90:e2 from blacklist (clear)
Removed BSSID 00:3a:99:04:bf:42 from blacklist (clear)
wlp1s0b1: No suitable network found
wlp1s0b1: Short-circuit new scan request since there are no enabled networks
wlp1s0b1: State: SCANNING -> INACTIVE
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3
wlp1s0b1: Removing interface wlp1s0b1
wlp1s0b1: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=INACTIVE
TDLS: Tear down peers
wlp1s0b1: State: INACTIVE -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit
ENGINE: engine deinit
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: BSS: Remove id 1 BSSID 00:3a:99:04:bf:42 SSID 'eduroam' due to wpa_bss_flush
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1'
wlp1s0b1: BSS: Remove id 0 BSSID 00:3a:99:04:bf:43 SSID 'test' due to wpa_bss_flush
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0'
wlp1s0b1: BSS: Remove id 3 BSSID 00:3a:98:f5:90:e2 SSID 'eduroam' due to wpa_bss_flush
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3'
wlp1s0b1: Cancelling scan request
wlp1s0b1: Cancelling authentication timeout
Remove interface wlp1s0b1 from radio phy0
Remove radio phy0
nl80211: deinit ifname=wlp1s0b1 disabled_11b_rates=0
nl80211: Remove monitor interface: refcount=0
netlink: Operstate: ifindex=2 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
nl80211: Set mode ifindex 2 iftype 2 (STATION)
nl80211: Unsubscribe mgmt frames handle 0x8888888889706779 (mode change)
dbus: Unregister interface object '/fi/w1/wpa_supplicant1/Interfaces/1'
wlp1s0b1: CTRL-EVENT-TERMINATING
dbus: Unregister D-Bus object '/fi/w1/wpa_supplicant1'
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment