Created
April 11, 2016 07:23
-
-
Save anonymous/99d68f2f05af967101a9502c96ffb8ec to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
-- Logs begin at Wed 2016-02-17 10:27:50 MSK, end at Fri 2016-04-08 21:49:10 MSK. -- | |
Apr 08 19:02:59 sergei_asus systemd[1]: Started WPA supplicant. | |
wpa_supplicant v2.5 | |
dbus: Register D-Bus object '/fi/w1/wpa_supplicant1' | |
Providing DBus service 'fi.w1.wpa_supplicant1'. | |
Providing DBus service 'fi.epitest.hostap.WPASupplicant'. | |
Successfully initialized wpa_supplicant | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1) [s] | |
dbus: fi.w1.wpa_supplicant1.CreateInterface (/fi/w1/wpa_supplicant1) [a{sv}] | |
wpa_dbus_dict_open_read: start reading a dict entry | |
wpa_dbus_dict_get_entry: dict entry key: Driver | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
wpa_dbus_dict_get_entry: dict entry key: Ifname | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
Initializing interface 'wlp1s0b1' conf 'N/A' driver 'nl80211,wext' ctrl_interface 'N/A' bridge 'N/A' | |
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0 | |
rfkill: initial event: idx=2 type=1 op=0 soft=0 hard=0 | |
rfkill: initial event: idx=3 type=2 op=0 soft=1 hard=0 | |
nl80211: Supported cipher 00-0f-ac:1 | |
nl80211: Supported cipher 00-0f-ac:5 | |
nl80211: Supported cipher 00-0f-ac:2 | |
nl80211: Supported cipher 00-0f-ac:4 | |
nl80211: Supported cipher 00-0f-ac:10 | |
nl80211: Supported cipher 00-0f-ac:8 | |
nl80211: Supported cipher 00-0f-ac:9 | |
nl80211: Using driver-based off-channel TX | |
nl80211: interface wlp1s0b1 in phy phy0 | |
nl80211: Set mode ifindex 2 iftype 2 (STATION) | |
nl80211: Subscribe to mgmt frames with non-AP handle 0x1f8eff0 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=040a | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=040b | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=040c | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=040d | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=090a | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=090b | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=090c | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=090d | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=0409506f9a09 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=7f506f9a09 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=0801 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=06 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=0a07 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=0a11 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=1101 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=1102 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1f8eff0 match=0505 | |
netlink: Operstate: ifindex=2 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT) | |
nl80211: driver param='(null)' | |
Add interface wlp1s0b1 to a new radio phy0 | |
nl80211: Regulatory information - country=BY (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 80 MHz 20 mBm | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) | |
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS) | |
nl80211: Added 802.11b mode based on 802.11g information | |
wlp1s0b1: Own MAC address: 74:2f:68:d2:b1:f3 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 | |
wlp1s0b1: RSN: flushing PMKID list in the driver | |
nl80211: Flush PMKIDs | |
wlp1s0b1: State: DISCONNECTED -> INACTIVE | |
TDLS: TDLS operation not supported by driver | |
TDLS: Driver uses internal link setup | |
TDLS: Driver does not support TDLS channel switching | |
wlp1s0b1: WPS: UUID based on MAC address: e909a86f-b1a7-5277-89e0-0bfd7fd694fd | |
ENGINE: Loading dynamic engine | |
ENGINE: Loading dynamic engine | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: KEY_RX entering state NO_KEY_RECEIVE | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
dbus: Register interface object '/fi/w1/wpa_supplicant1/Interfaces/1' | |
wlp1s0b1: Added interface wlp1s0b1 | |
wlp1s0b1: State: INACTIVE -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1) [s] | |
dbus: fi.w1.wpa_supplicant1.Interface.NetworkReply (/fi/w1/wpa_supplicant1/Interfaces/1) [oss] | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x1f91c60 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
wlp1s0b1: Starting radio work 'scan'@0x1f91c60 after 0.000160 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 10 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000112 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.668576 seconds | |
nl80211: Received scan results (3 BSSes) | |
wlp1s0b1: BSS: Start scan result update 1 | |
wlp1s0b1: BSS: Add new id 0 BSSID 00:3a:99:04:bf:43 SSID 'test' freq 2412 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0' | |
wlp1s0b1: BSS: Add new id 1 BSSID 00:3a:99:04:bf:42 SSID 'eduroam' freq 2412 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1' | |
wlp1s0b1: BSS: Add new id 2 BSSID 00:3a:98:f5:90:e2 SSID 'eduroam' freq 2437 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2' | |
BSS: last_scan_res_used=3/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
wlp1s0b1: Radio work 'scan'@0x1f91c60 done in 0.670042 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: DISCONNECTED -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0) [s] | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1) [s] | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2) [s] | |
EAPOL: disable timer tick | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x1f90880 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x1f90880 after 0.000100 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000060 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.673861 seconds | |
nl80211: Received scan results (3 BSSes) | |
wlp1s0b1: BSS: Start scan result update 2 | |
BSS: last_scan_res_used=3/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
wlp1s0b1: Radio work 'scan'@0x1f90880 done in 0.674665 seconds | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: INACTIVE -> INACTIVE | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv] | |
properties_get_or_set: Set(ApScan) | |
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
wpa_dbus_dict_open_read: start reading a dict entry | |
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
proactive_key_caching=1 (0x1) | |
wpa_dbus_dict_get_entry: dict entry key: password | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=6): [REMOVED] | |
password - hexdump_ascii(len=6): [REMOVED] | |
wpa_dbus_dict_get_entry: dict entry key: phase1 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase1 - hexdump_ascii(len=9): | |
70 65 61 70 76 65 72 3d 30 peapver=0 | |
wpa_dbus_dict_get_entry: dict entry key: eap | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 | |
wpa_dbus_dict_get_entry: dict entry key: phase2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase2 - hexdump_ascii(len=13): | |
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 | |
wpa_dbus_dict_get_entry: dict entry key: ca_path | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=7): [REMOVED] | |
ssid - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wpa_dbus_dict_get_entry: dict entry key: key_mgmt | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
key_mgmt: 0x1 | |
wpa_dbus_dict_get_entry: dict entry key: identity | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=12): [REMOVED] | |
identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 USER_LOGIN_OMITTED | |
wpa_dbus_dict_get_entry: dict entry key: scan_ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
scan_ssid=1 (0x1) | |
wpa_dbus_dict_get_entry: dict entry key: fragment_size | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266 | |
fragment_size=1266 (0x4f2) | |
wpa_dbus_dict_get_entry: dict entry key: ca_path2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path2 - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: bgscan | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=17): [REMOVED] | |
bgscan - hexdump_ascii(len=17): | |
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30 | |
30 0 | |
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:99:04:bf:42 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-61 freq=2412 | |
wlp1s0b1: selected based on RSN IE | |
wlp1s0b1: selected BSS 00:3a:99:04:bf:42 ssid='eduroam' | |
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:99:04:bf:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: INACTIVE ssid=0x1fb33c0 current_ssid=0x1fb33c0 | |
wlp1s0b1: Request association with 00:3a:99:04:bf:42 | |
wlp1s0b1: Add radio work 'sme-connect'@0x1fb2790 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'sme-connect'@0x1fb2790 after 0.000333 second wait | |
wlp1s0b1: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=0x1fb33c0 try_opportunistic=1 | |
RSN: Search for BSSID 00:3a:99:04:bf:42 | |
RSN: Consider 00:3a:99:04:bf:42 for OKC | |
RSN: No PMKSA cache entry found | |
wlp1s0b1: RSN: using IEEE 802.11i/D9.0 | |
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2 | |
wlp1s0b1: WPA: Selected mgmt group cipher 32 | |
wlp1s0b1: WPA: clearing AP WPA IE | |
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 | |
wlp1s0b1: WPA: using GTK TKIP | |
wlp1s0b1: WPA: using PTK CCMP | |
wlp1s0b1: WPA: using KEY_MGMT 802.1X | |
wlp1s0b1: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: SME: Trying to authenticate with 00:3a:99:04:bf:42 (SSID='eduroam' freq=2412 MHz) | |
wlp1s0b1: State: INACTIVE -> AUTHENTICATING | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
wlp1s0b1: Determining shared radio frequencies (max len 1) | |
wlp1s0b1: Shared frequencies (len=0): completed iteration | |
nl80211: Authenticate (ifindex=2) | |
* bssid=00:3a:99:04:bf:42 | |
* freq=2412 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
nl80211: Event message available | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1 | |
nl80211: New station 00:3a:99:04:bf:42 | |
nl80211: Event message available | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:04:bf:42 | |
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 04 bf 42 00 3a 99 04 bf 42 d0 8f 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp1s0b1: Event AUTH (11) received | |
wlp1s0b1: SME: Authentication response: peer=00:3a:99:04:bf:42 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp1s0b1: set_disable_max_amsdu: -1 | |
wlp1s0b1: set_ampdu_factor: -1 | |
wlp1s0b1: set_ampdu_density: -1 | |
wlp1s0b1: set_disable_ht40: 0 | |
wlp1s0b1: set_disable_sgi: 0 | |
wlp1s0b1: set_disable_ldpc: 0 | |
wlp1s0b1: Trying to associate with 00:3a:99:04:bf:42 (SSID='eduroam' freq=2412 MHz) | |
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
nl80211: Associate (ifindex=2) | |
* bssid=00:3a:99:04:bf:42 | |
* freq=2412 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac02 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:04:bf:42 | |
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 04 bf 42 00 3a 99 04 bf 42 e0 8f 31 04 00 00 0f c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
nl80211: Associate event | |
wlp1s0b1: Event ASSOC (0) received | |
wlp1s0b1: Association info event | |
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
wlp1s0b1: freq=2412 MHz | |
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:99:04:bf:42 | |
wlp1s0b1: Associated with 00:3a:99:04:bf:42 | |
wlp1s0b1: WPA: Association event - clear replay counter | |
wlp1s0b1: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: enable timer tick | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec | |
wlp1s0b1: Cancelling scan request | |
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 | |
WMM AC: U-APSD queues=0x0 | |
WMM AC: Valid WMM association, WMM AC is enabled | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
l2_packet_receive: src=00:3a:99:04:bf:42 len=50 | |
wlp1s0b1: RX EAPOL from 00:3a:99:04:bf:42 | |
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c 70 6f 72 74 69 64 3d 32 39 | |
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_PAE entering state RESTART | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 | |
EAP: EAP entering state IDENTITY | |
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started | |
EAP: Status notification: started (param=) | |
EAP: EAP-Request Identity data - hexdump_ascii(len=41): | |
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro | |
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c am,nasid=WiFi-B, | |
70 6f 72 74 69 64 3d 32 39 portid=29 | |
EAP: using real identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 USER_LOGIN_OMITTED | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:99:04:bf:42 | |
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41 | |
EAPOL: SUPP_BE entering state RECEIVE | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=3 | |
* type=0 | |
* alpha2=RU | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=RU (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 40 MHz 20 mBm | |
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS) | |
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS) | |
nl80211: 5735-5835 @ 40 MHz 30 mBm | |
nl80211: 57000-66000 @ 2160 MHz 40 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
l2_packet_receive: src=00:3a:99:04:bf:42 len=10 | |
wlp1s0b1: RX EAPOL from 00:3a:99:04:bf:42 | |
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state GET_METHOD | |
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 | |
EAP: Status notification: accept proposed method (param=PEAP) | |
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) | |
EAP-PEAP: Forced PEAP version 0 | |
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 | |
TLS: using phase1 config options | |
TLS: Trusted root certificate(s) loaded | |
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=6) - Flags 0x20 | |
EAP-PEAP: Start (server ver=0, own ver=0) | |
EAP-PEAP: Using PEAP version 0 | |
SSL: (where=0x10 ret=0x1) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:before/connect initialization | |
OpenSSL: TX ver=0x303 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x303 content_type=22 | |
OpenSSL: Message - hexdump(len=298): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:SSLv2/v3 write client hello A | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in SSLv2/v3 read server hello A | |
SSL: SSL_connect - want more data | |
SSL: 303 bytes pending from ssl_out | |
SSL: 303 bytes left to be sent out (of total 303 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1fb55a0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:99:04:bf:42 | |
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 88 89 41 3b f9 79 ac 95 f6 d4 13 85 b9 de 3c e0 e9 35 37 32 04 1c d7 a6 64 66 55 03 fa b1 73 6a 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:99:04:bf:42 len=8 | |
wlp1s0b1: RX EAPOL from 00:3a:99:04:bf:42 | |
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Failure | |
EAP: Status notification: completion (param=failure) | |
EAP: EAP entering state FAILURE | |
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed | |
EAPOL: SUPP_PAE entering state HELD | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Set supplicant port unauthorized for 00:3a:99:04:bf:42 | |
EAPOL: SUPP_BE entering state RECEIVE | |
EAPOL: SUPP_BE entering state FAIL | |
EAPOL: SUPP_BE entering state IDLE | |
EAPOL authentication completed - result=FAILURE | |
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec | |
EAPOL: startWhen --> 0 | |
wlp1s0b1: Authentication with 00:3a:99:04:bf:42 timed out. | |
Added BSSID 00:3a:99:04:bf:42 into blacklist | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Request to deauthenticate - bssid=00:3a:99:04:bf:42 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED | |
TDLS: Tear down peers | |
wpa_driver_nl80211_deauthenticate(addr=00:3a:99:04:bf:42 reason_code=3) | |
wlp1s0b1: Event DEAUTH (12) received | |
wlp1s0b1: Deauthentication notification | |
wlp1s0b1: * reason 3 (locally generated) | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:99:04:bf:42 reason=3 locally_generated=1 | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED | |
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6) | |
wlp1s0b1: Setting scan request: 0.100000 sec | |
wlp1s0b1: Radio work 'sme-connect'@0x1fb2790 done in 2.041640 seconds | |
BSSID 00:3a:99:04:bf:42 blacklist count incremented to 2 | |
wlp1s0b1: Blacklist count 2 --> request scan in 500 ms | |
wlp1s0b1: Ignore new scan request for 0.500000 sec since an earlier request is scheduled to trigger sooner | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Disconnect event - remove keys | |
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WMM AC: WMM AC is disabled | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner | |
nl80211: Event message available | |
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1 | |
nl80211: Delete station 00:3a:99:04:bf:42 | |
nl80211: Event message available | |
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:99:04:bf:42 A2=74:2f:68:d2:b1:f3 | |
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 99 04 bf 42 74 2f 68 d2 b1 f3 00 3a 99 04 bf 42 00 00 03 00 | |
nl80211: Deauthenticate event | |
nl80211: Ignore deauth event triggered due to own deauth request | |
nl80211: Event message available | |
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1 | |
nl80211: Ignore disconnect event when using userspace SME | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=0 | |
* type=1 | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=00 | |
nl80211: 2402-2472 @ 40 MHz 20 mBm | |
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR) | |
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) | |
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) | |
nl80211: 57240-63720 @ 2160 MHz 0 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=1 | |
* type=0 | |
* alpha2=BY | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=BY (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 80 MHz 20 mBm | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) | |
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS) | |
nl80211: Added 802.11b mode based on 802.11g information | |
wlp1s0b1: State: DISCONNECTED -> SCANNING | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x1fb2790 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x1fb2790 after 0.000020 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000059 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.682812 seconds | |
nl80211: Received scan results (3 BSSes) | |
wlp1s0b1: BSS: Start scan result update 3 | |
BSS: last_scan_res_used=3/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
wlp1s0b1: Radio work 'scan'@0x1fb2790 done in 0.683535 seconds | |
wlp1s0b1: Postpone network selection by 9 seconds since all networks are disabled | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
EAPOL: disable timer tick | |
wlp1s0b1: Try to associate due to network getting re-enabled | |
Fast associate: Old scan results | |
wlp1s0b1: Setting scan request: 0.000000 sec | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x1fb2790 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x1fb2790 after 0.000017 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000060 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.701427 seconds | |
nl80211: Received scan results (3 BSSes) | |
wlp1s0b1: BSS: Start scan result update 4 | |
BSS: last_scan_res_used=3/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
wlp1s0b1: Radio work 'scan'@0x1fb2790 done in 0.702208 seconds | |
wlp1s0b1: CTRL-EVENT-SSID-REENABLED id=0 ssid="eduroam" | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:99:04:bf:42 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-63 freq=2412 | |
wlp1s0b1: skip - blacklisted (count=2 limit=0) | |
wlp1s0b1: 1: 00:3a:99:04:bf:43 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-64 freq=2412 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 2: 00:3a:98:f5:90:e2 ssid='eduroam' wpa_ie_len=32 rsn_ie_len=28 caps=0x431 level=-83 freq=2437 | |
wlp1s0b1: selected based on RSN IE | |
wlp1s0b1: selected BSS 00:3a:98:f5:90:e2 ssid='eduroam' | |
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:98:f5:90:e2 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x1fb33c0 current_ssid=(nil) | |
wlp1s0b1: Request association with 00:3a:98:f5:90:e2 | |
wlp1s0b1: Re-association to the same ESS | |
wlp1s0b1: Add radio work 'sme-connect'@0x1fb2790 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'sme-connect'@0x1fb2790 after 0.000029 second wait | |
wlp1s0b1: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=1 | |
RSN: Search for BSSID 00:3a:98:f5:90:e2 | |
RSN: Consider 00:3a:98:f5:90:e2 for OKC | |
RSN: No PMKSA cache entry found | |
wlp1s0b1: RSN: using IEEE 802.11i/D9.0 | |
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2 | |
wlp1s0b1: WPA: Selected mgmt group cipher 32 | |
WPA: set AP WPA IE - hexdump(len=34): dd 20 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 02 00 00 50 f2 01 00 40 96 00 00 00 | |
WPA: set AP RSN IE - hexdump(len=30): 30 1c 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 02 00 00 0f ac 01 00 40 96 00 28 00 | |
wlp1s0b1: WPA: using GTK TKIP | |
wlp1s0b1: WPA: using PTK CCMP | |
wlp1s0b1: WPA: using KEY_MGMT 802.1X | |
wlp1s0b1: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz) | |
wlp1s0b1: State: SCANNING -> AUTHENTICATING | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
wlp1s0b1: Determining shared radio frequencies (max len 1) | |
wlp1s0b1: Shared frequencies (len=0): completed iteration | |
nl80211: Authenticate (ifindex=2) | |
* bssid=00:3a:98:f5:90:e2 | |
* freq=2437 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1 | |
nl80211: New station 00:3a:98:f5:90:e2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 | |
nl80211: Event message available | |
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1 | |
nl80211: Delete station 00:3a:98:f5:90:e2 | |
nl80211: Event message available | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 37; timeout with 00:3a:98:f5:90:e2 | |
wlp1s0b1: Event AUTH_TIMED_OUT (14) received | |
wlp1s0b1: SME: Authentication timed out | |
wlp1s0b1: Radio work 'sme-connect'@0x1fb2790 done in 0.360956 seconds | |
Added BSSID 00:3a:98:f5:90:e2 into blacklist | |
wlp1s0b1: Blacklist count 1 --> request scan in 100 ms | |
wlp1s0b1: Setting scan request: 0.100000 sec | |
wlp1s0b1: State: AUTHENTICATING -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
wlp1s0b1: State: DISCONNECTED -> SCANNING | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x1fb2790 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x1fb2790 after 0.000021 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000060 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.697508 seconds | |
nl80211: Received scan results (2 BSSes) | |
wlp1s0b1: BSS: Start scan result update 5 | |
BSS: last_scan_res_used=2/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
wlp1s0b1: Radio work 'scan'@0x1fb2790 done in 0.698231 seconds | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:99:04:bf:42 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-62 freq=2412 | |
wlp1s0b1: skip - blacklisted (count=2 limit=0) | |
wlp1s0b1: 1: 00:3a:99:04:bf:43 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-64 freq=2412 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: No APs found - clear blacklist and try again | |
Removed BSSID 00:3a:98:f5:90:e2 from blacklist (clear) | |
Removed BSSID 00:3a:99:04:bf:42 from blacklist (clear) | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:99:04:bf:42 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-62 freq=2412 | |
wlp1s0b1: selected based on RSN IE | |
wlp1s0b1: selected BSS 00:3a:99:04:bf:42 ssid='eduroam' | |
wlp1s0b1: Considering connect request: reassociate: 0 selected: 00:3a:99:04:bf:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x1fb33c0 current_ssid=(nil) | |
wlp1s0b1: Request association with 00:3a:99:04:bf:42 | |
wlp1s0b1: Re-association to the same ESS | |
wlp1s0b1: Add radio work 'sme-connect'@0x1fb2790 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
RSN: Consider 00:3a:98:f5:90:e2 for OKC | |
RSN: Ignored PMKID candidate without preauth flag | |
wlp1s0b1: Starting radio work 'sme-connect'@0x1fb2790 after 0.000045 second wait | |
wlp1s0b1: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=1 | |
RSN: Search for BSSID 00:3a:99:04:bf:42 | |
RSN: Consider 00:3a:99:04:bf:42 for OKC | |
RSN: No PMKSA cache entry found | |
wlp1s0b1: RSN: using IEEE 802.11i/D9.0 | |
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2 | |
wlp1s0b1: WPA: Selected mgmt group cipher 32 | |
wlp1s0b1: WPA: clearing AP WPA IE | |
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 | |
wlp1s0b1: WPA: using GTK TKIP | |
wlp1s0b1: WPA: using PTK CCMP | |
wlp1s0b1: WPA: using KEY_MGMT 802.1X | |
wlp1s0b1: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: SME: Trying to authenticate with 00:3a:99:04:bf:42 (SSID='eduroam' freq=2412 MHz) | |
wlp1s0b1: State: SCANNING -> AUTHENTICATING | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
wlp1s0b1: Determining shared radio frequencies (max len 1) | |
wlp1s0b1: Shared frequencies (len=0): completed iteration | |
nl80211: Authenticate (ifindex=2) | |
* bssid=00:3a:99:04:bf:42 | |
* freq=2412 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1 | |
nl80211: New station 00:3a:99:04:bf:42 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
nl80211: Event message available | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:04:bf:42 | |
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 04 bf 42 00 3a 99 04 bf 42 f0 a4 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp1s0b1: Event AUTH (11) received | |
wlp1s0b1: SME: Authentication response: peer=00:3a:99:04:bf:42 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp1s0b1: set_disable_max_amsdu: -1 | |
wlp1s0b1: set_ampdu_factor: -1 | |
wlp1s0b1: set_ampdu_density: -1 | |
wlp1s0b1: set_disable_ht40: 0 | |
wlp1s0b1: set_disable_sgi: 0 | |
wlp1s0b1: set_disable_ldpc: 0 | |
wlp1s0b1: Trying to associate with 00:3a:99:04:bf:42 (SSID='eduroam' freq=2412 MHz) | |
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
nl80211: Associate (ifindex=2) | |
* bssid=00:3a:99:04:bf:42 | |
* freq=2412 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac02 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
l2_packet_receive: src=00:3a:99:04:bf:42 len=50 | |
wlp1s0b1: RX EAPOL from 00:3a:99:04:bf:42 | |
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c 70 6f 72 74 69 64 3d 32 39 | |
wlp1s0b1: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:04:bf:42 | |
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 04 bf 42 00 3a 99 04 bf 42 10 a5 31 04 00 00 0f c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
nl80211: Associate event | |
wlp1s0b1: Event ASSOC (0) received | |
wlp1s0b1: Association info event | |
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
wlp1s0b1: freq=2412 MHz | |
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:99:04:bf:42 | |
wlp1s0b1: Associated with 00:3a:99:04:bf:42 | |
wlp1s0b1: WPA: Association event - clear replay counter | |
wlp1s0b1: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: enable timer tick | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE | |
ENGINE: engine deinit | |
EAP: EAP entering state IDLE | |
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: Process pending EAPOL frame that was received just before association notification | |
wlp1s0b1: RX EAPOL from 00:3a:99:04:bf:42 | |
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c 70 6f 72 74 69 64 3d 32 39 | |
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_PAE entering state RESTART | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 | |
EAP: EAP entering state IDENTITY | |
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started | |
EAP: Status notification: started (param=) | |
EAP: EAP-Request Identity data - hexdump_ascii(len=41): | |
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro | |
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c am,nasid=WiFi-B, | |
70 6f 72 74 69 64 3d 32 39 portid=29 | |
EAP: using real identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 USER_LOGIN_OMITTED | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:99:04:bf:42 | |
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41 | |
EAPOL: SUPP_BE entering state RECEIVE | |
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 | |
WMM AC: U-APSD queues=0x0 | |
WMM AC: Valid WMM association, WMM AC is enabled | |
nl80211: Event message available | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=3 | |
* type=0 | |
* alpha2=RU | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=RU (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 40 MHz 20 mBm | |
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS) | |
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS) | |
nl80211: 5735-5835 @ 40 MHz 30 mBm | |
nl80211: 57000-66000 @ 2160 MHz 40 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
l2_packet_receive: src=00:3a:99:04:bf:42 len=10 | |
wlp1s0b1: RX EAPOL from 00:3a:99:04:bf:42 | |
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state GET_METHOD | |
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 | |
EAP: Status notification: accept proposed method (param=PEAP) | |
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) | |
EAP-PEAP: Forced PEAP version 0 | |
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 | |
TLS: using phase1 config options | |
TLS: Trusted root certificate(s) loaded | |
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=6) - Flags 0x20 | |
EAP-PEAP: Start (server ver=0, own ver=0) | |
EAP-PEAP: Using PEAP version 0 | |
SSL: (where=0x10 ret=0x1) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:before/connect initialization | |
OpenSSL: TX ver=0x303 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x303 content_type=22 | |
OpenSSL: Message - hexdump(len=298): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:SSLv2/v3 write client hello A | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in SSLv2/v3 read server hello A | |
SSL: SSL_connect - want more data | |
SSL: 303 bytes pending from ssl_out | |
SSL: 303 bytes left to be sent out (of total 303 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1fb5460 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:99:04:bf:42 | |
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 d4 a5 0b 32 eb 1e be 48 bb 10 0e 09 b3 07 55 18 0e 30 33 0f 9c 8f 0d 4d 59 fb 5d aa 42 23 f9 ce 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:99:04:bf:42 len=8 | |
wlp1s0b1: RX EAPOL from 00:3a:99:04:bf:42 | |
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Failure | |
EAP: Status notification: completion (param=failure) | |
EAP: EAP entering state FAILURE | |
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed | |
EAPOL: SUPP_PAE entering state HELD | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Set supplicant port unauthorized for 00:3a:99:04:bf:42 | |
EAPOL: SUPP_BE entering state RECEIVE | |
EAPOL: SUPP_BE entering state FAIL | |
EAPOL: SUPP_BE entering state IDLE | |
EAPOL authentication completed - result=FAILURE | |
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec | |
EAPOL: startWhen --> 0 | |
wlp1s0b1: Authentication with 00:3a:99:04:bf:42 timed out. | |
Added BSSID 00:3a:99:04:bf:42 into blacklist | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Request to deauthenticate - bssid=00:3a:99:04:bf:42 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED | |
TDLS: Tear down peers | |
wpa_driver_nl80211_deauthenticate(addr=00:3a:99:04:bf:42 reason_code=3) | |
wlp1s0b1: Event DEAUTH (12) received | |
wlp1s0b1: Deauthentication notification | |
wlp1s0b1: * reason 3 (locally generated) | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:99:04:bf:42 reason=3 locally_generated=1 | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=2 duration=23 reason=AUTH_FAILED | |
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6) | |
wlp1s0b1: Setting scan request: 0.100000 sec | |
wlp1s0b1: Radio work 'sme-connect'@0x1fb2790 done in 2.052209 seconds | |
BSSID 00:3a:99:04:bf:42 blacklist count incremented to 2 | |
Continuous association failures - consider temporary network disabling | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=3 duration=46 reason=CONN_FAILED | |
wlp1s0b1: Blacklist count 4 --> request scan in 5000 ms | |
wlp1s0b1: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Disconnect event - remove keys | |
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WMM AC: WMM AC is disabled | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner | |
nl80211: Event message available | |
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1 | |
nl80211: Delete station 00:3a:99:04:bf:42 | |
nl80211: Event message available | |
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:99:04:bf:42 A2=74:2f:68:d2:b1:f3 | |
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 99 04 bf 42 74 2f 68 d2 b1 f3 00 3a 99 04 bf 42 00 00 03 00 | |
nl80211: Deauthenticate event | |
nl80211: Ignore deauth event triggered due to own deauth request | |
nl80211: Event message available | |
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1 | |
nl80211: Ignore disconnect event when using userspace SME | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=0 | |
* type=1 | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=00 | |
nl80211: 2402-2472 @ 40 MHz 20 mBm | |
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR) | |
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) | |
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) | |
nl80211: 57240-63720 @ 2160 MHz 0 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=1 | |
* type=0 | |
* alpha2=BY | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=BY (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 80 MHz 20 mBm | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) | |
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS) | |
nl80211: Added 802.11b mode based on 802.11g information | |
wlp1s0b1: State: DISCONNECTED -> SCANNING | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x1fb3360 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x1fb3360 after 0.000020 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000059 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.699782 seconds | |
nl80211: Received scan results (2 BSSes) | |
wlp1s0b1: BSS: Start scan result update 6 | |
wlp1s0b1: BSS: Remove id 2 BSSID 00:3a:98:f5:90:e2 SSID 'eduroam' due to no match in scan | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2' | |
BSS: last_scan_res_used=2/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
wlp1s0b1: Radio work 'scan'@0x1fb3360 done in 0.700606 seconds | |
wlp1s0b1: Postpone network selection by 45 seconds since all networks are disabled | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
EAPOL: disable timer tick | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv] | |
properties_get_or_set: Set(ApScan) | |
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
wpa_dbus_dict_open_read: start reading a dict entry | |
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
proactive_key_caching=1 (0x1) | |
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate | |
ENGINE: engine deinit | |
wpa_dbus_dict_get_entry: dict entry key: password | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=6): [REMOVED] | |
password - hexdump_ascii(len=6): [REMOVED] | |
wpa_dbus_dict_get_entry: dict entry key: phase1 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase1 - hexdump_ascii(len=9): | |
70 65 61 70 76 65 72 3d 30 peapver=0 | |
wpa_dbus_dict_get_entry: dict entry key: eap | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 | |
wpa_dbus_dict_get_entry: dict entry key: phase2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase2 - hexdump_ascii(len=13): | |
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 | |
wpa_dbus_dict_get_entry: dict entry key: ca_path | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=7): [REMOVED] | |
ssid - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wpa_dbus_dict_get_entry: dict entry key: key_mgmt | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
key_mgmt: 0x1 | |
wpa_dbus_dict_get_entry: dict entry key: identity | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=12): [REMOVED] | |
identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 USER_LOGIN_OMITTED | |
wpa_dbus_dict_get_entry: dict entry key: scan_ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
scan_ssid=1 (0x1) | |
wpa_dbus_dict_get_entry: dict entry key: fragment_size | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266 | |
fragment_size=1266 (0x4f2) | |
wpa_dbus_dict_get_entry: dict entry key: ca_path2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path2 - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: bgscan | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=17): [REMOVED] | |
bgscan - hexdump_ascii(len=17): | |
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30 | |
30 0 | |
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
Fast associate: Old scan results | |
wlp1s0b1: Setting scan request: 0.000000 sec | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x1fb0e80 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x1fb0e80 after 0.000016 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000058 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.667589 seconds | |
nl80211: Received scan results (2 BSSes) | |
wlp1s0b1: BSS: Start scan result update 7 | |
BSS: last_scan_res_used=2/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
wlp1s0b1: Radio work 'scan'@0x1fb0e80 done in 0.668313 seconds | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:99:04:bf:42 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-62 freq=2412 | |
wlp1s0b1: skip - blacklisted (count=2 limit=0) | |
wlp1s0b1: 1: 00:3a:99:04:bf:43 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-62 freq=2412 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: No APs found - clear blacklist and try again | |
Removed BSSID 00:3a:99:04:bf:42 from blacklist (clear) | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:99:04:bf:42 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-62 freq=2412 | |
wlp1s0b1: selected based on RSN IE | |
wlp1s0b1: selected BSS 00:3a:99:04:bf:42 ssid='eduroam' | |
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:99:04:bf:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x1fb3360 current_ssid=0x1fb3360 | |
wlp1s0b1: Request association with 00:3a:99:04:bf:42 | |
wlp1s0b1: Add radio work 'sme-connect'@0x1fb0e80 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'sme-connect'@0x1fb0e80 after 0.000027 second wait | |
wlp1s0b1: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=0x1fb3360 try_opportunistic=1 | |
RSN: Search for BSSID 00:3a:99:04:bf:42 | |
RSN: Consider 00:3a:99:04:bf:42 for OKC | |
RSN: No PMKSA cache entry found | |
wlp1s0b1: RSN: using IEEE 802.11i/D9.0 | |
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2 | |
wlp1s0b1: WPA: Selected mgmt group cipher 32 | |
wlp1s0b1: WPA: clearing AP WPA IE | |
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 | |
wlp1s0b1: WPA: using GTK TKIP | |
wlp1s0b1: WPA: using PTK CCMP | |
wlp1s0b1: WPA: using KEY_MGMT 802.1X | |
wlp1s0b1: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: SME: Trying to authenticate with 00:3a:99:04:bf:42 (SSID='eduroam' freq=2412 MHz) | |
wlp1s0b1: State: SCANNING -> AUTHENTICATING | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
wlp1s0b1: Determining shared radio frequencies (max len 1) | |
wlp1s0b1: Shared frequencies (len=0): completed iteration | |
nl80211: Authenticate (ifindex=2) | |
* bssid=00:3a:99:04:bf:42 | |
* freq=2412 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1 | |
nl80211: New station 00:3a:99:04:bf:42 | |
nl80211: Event message available | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:04:bf:42 | |
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 04 bf 42 00 3a 99 04 bf 42 b0 bc 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp1s0b1: Event AUTH (11) received | |
wlp1s0b1: SME: Authentication response: peer=00:3a:99:04:bf:42 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp1s0b1: set_disable_max_amsdu: -1 | |
wlp1s0b1: set_ampdu_factor: -1 | |
wlp1s0b1: set_ampdu_density: -1 | |
wlp1s0b1: set_disable_ht40: 0 | |
wlp1s0b1: set_disable_sgi: 0 | |
wlp1s0b1: set_disable_ldpc: 0 | |
wlp1s0b1: Trying to associate with 00:3a:99:04:bf:42 (SSID='eduroam' freq=2412 MHz) | |
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
nl80211: Associate (ifindex=2) | |
* bssid=00:3a:99:04:bf:42 | |
* freq=2412 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac02 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
nl80211: Event message available | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:99:04:bf:42 | |
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 99 04 bf 42 00 3a 99 04 bf 42 c0 bc 31 04 00 00 0f c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
nl80211: Associate event | |
wlp1s0b1: Event ASSOC (0) received | |
wlp1s0b1: Association info event | |
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
wlp1s0b1: freq=2412 MHz | |
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:99:04:bf:42 | |
wlp1s0b1: Associated with 00:3a:99:04:bf:42 | |
wlp1s0b1: WPA: Association event - clear replay counter | |
wlp1s0b1: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: enable timer tick | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec | |
wlp1s0b1: Cancelling scan request | |
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 | |
WMM AC: U-APSD queues=0x0 | |
WMM AC: Valid WMM association, WMM AC is enabled | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
l2_packet_receive: src=00:3a:99:04:bf:42 len=50 | |
wlp1s0b1: RX EAPOL from 00:3a:99:04:bf:42 | |
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c 70 6f 72 74 69 64 3d 32 39 | |
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_PAE entering state RESTART | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 | |
EAP: EAP entering state IDENTITY | |
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started | |
EAP: Status notification: started (param=) | |
EAP: EAP-Request Identity data - hexdump_ascii(len=41): | |
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro | |
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c am,nasid=WiFi-B, | |
70 6f 72 74 69 64 3d 32 39 portid=29 | |
EAP: using real identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 USER_LOGIN_OMITTED | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:99:04:bf:42 | |
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41 | |
EAPOL: SUPP_BE entering state RECEIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=3 | |
* type=0 | |
* alpha2=RU | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=RU (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 40 MHz 20 mBm | |
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS) | |
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS) | |
nl80211: 5735-5835 @ 40 MHz 30 mBm | |
nl80211: 57000-66000 @ 2160 MHz 40 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
l2_packet_receive: src=00:3a:99:04:bf:42 len=10 | |
wlp1s0b1: RX EAPOL from 00:3a:99:04:bf:42 | |
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state GET_METHOD | |
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 | |
EAP: Status notification: accept proposed method (param=PEAP) | |
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) | |
EAP-PEAP: Forced PEAP version 0 | |
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 | |
TLS: using phase1 config options | |
TLS: Trusted root certificate(s) loaded | |
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=6) - Flags 0x20 | |
EAP-PEAP: Start (server ver=0, own ver=0) | |
EAP-PEAP: Using PEAP version 0 | |
SSL: (where=0x10 ret=0x1) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:before/connect initialization | |
OpenSSL: TX ver=0x303 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x303 content_type=22 | |
OpenSSL: Message - hexdump(len=298): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:SSLv2/v3 write client hello A | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in SSLv2/v3 read server hello A | |
SSL: SSL_connect - want more data | |
SSL: 303 bytes pending from ssl_out | |
SSL: 303 bytes left to be sent out (of total 303 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1fb7040 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:99:04:bf:42 | |
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 3e 21 6d 45 cc e0 53 80 cd 27 8a e9 a9 93 07 0f f8 6e af 61 fc 27 2c 2f 55 2d f6 ca 5e f6 09 c3 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:99:04:bf:42 len=8 | |
wlp1s0b1: RX EAPOL from 00:3a:99:04:bf:42 | |
RX EAPOL - hexdump(len=8): 02 00 00 04 04 02 00 04 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Failure | |
EAP: Status notification: completion (param=failure) | |
EAP: EAP entering state FAILURE | |
wlp1s0b1: CTRL-EVENT-EAP-FAILURE EAP authentication failed | |
EAPOL: SUPP_PAE entering state HELD | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Set supplicant port unauthorized for 00:3a:99:04:bf:42 | |
EAPOL: SUPP_BE entering state RECEIVE | |
EAPOL: SUPP_BE entering state FAIL | |
EAPOL: SUPP_BE entering state IDLE | |
EAPOL authentication completed - result=FAILURE | |
wlp1s0b1: Setting authentication timeout: 2 sec 0 usec | |
EAPOL: startWhen --> 0 | |
wlp1s0b1: Authentication with 00:3a:99:04:bf:42 timed out. | |
Added BSSID 00:3a:99:04:bf:42 into blacklist | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Request to deauthenticate - bssid=00:3a:99:04:bf:42 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED | |
TDLS: Tear down peers | |
wpa_driver_nl80211_deauthenticate(addr=00:3a:99:04:bf:42 reason_code=3) | |
wlp1s0b1: Event DEAUTH (12) received | |
wlp1s0b1: Deauthentication notification | |
wlp1s0b1: * reason 3 (locally generated) | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:99:04:bf:42 reason=3 locally_generated=1 | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED | |
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6) | |
wlp1s0b1: Setting scan request: 0.100000 sec | |
wlp1s0b1: Radio work 'sme-connect'@0x1fb0e80 done in 2.046081 seconds | |
BSSID 00:3a:99:04:bf:42 blacklist count incremented to 2 | |
Continuous association failures - consider temporary network disabling | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=2 duration=37 reason=CONN_FAILED | |
wlp1s0b1: Blacklist count 6 --> request scan in 10000 ms | |
wlp1s0b1: Ignore new scan request for 10.000000 sec since an earlier request is scheduled to trigger sooner | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Disconnect event - remove keys | |
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WMM AC: WMM AC is disabled | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner | |
nl80211: Event message available | |
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1 | |
nl80211: Delete station 00:3a:99:04:bf:42 | |
nl80211: Event message available | |
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:99:04:bf:42 A2=74:2f:68:d2:b1:f3 | |
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 99 04 bf 42 74 2f 68 d2 b1 f3 00 3a 99 04 bf 42 00 00 03 00 | |
nl80211: Deauthenticate event | |
nl80211: Ignore deauth event triggered due to own deauth request | |
nl80211: Event message available | |
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1 | |
nl80211: Ignore disconnect event when using userspace SME | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=0 | |
* type=1 | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=00 | |
nl80211: 2402-2472 @ 40 MHz 20 mBm | |
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR) | |
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) | |
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) | |
nl80211: 57240-63720 @ 2160 MHz 0 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=1 | |
* type=0 | |
* alpha2=BY | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=BY (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 80 MHz 20 mBm | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) | |
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS) | |
nl80211: Added 802.11b mode based on 802.11g information | |
wlp1s0b1: State: DISCONNECTED -> SCANNING | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x1fbca30 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x1fbca30 after 0.000019 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000060 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.675923 seconds | |
nl80211: Received scan results (4 BSSes) | |
wlp1s0b1: BSS: Start scan result update 8 | |
wlp1s0b1: BSS: Add new id 3 BSSID 00:3a:98:f5:90:e2 SSID 'eduroam' freq 2437 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3' | |
wlp1s0b1: BSS: Add new id 4 BSSID 00:3a:99:d2:61:60 SSID 'BSU-Conference' freq 2462 | |
dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4' | |
BSS: last_scan_res_used=4/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
wlp1s0b1: Radio work 'scan'@0x1fbca30 done in 0.677011 seconds | |
wlp1s0b1: Postpone network selection by 36 seconds since all networks are disabled | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3) [s] | |
dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4) [s] | |
EAPOL: disable timer tick | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) [ssv] | |
properties_get_or_set: Set(ApScan) | |
dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
wpa_dbus_dict_open_read: start reading a dict entry | |
wpa_dbus_dict_get_entry: dict entry key: proactive_key_caching | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
proactive_key_caching=1 (0x1) | |
EAP: deinitialize previously used EAP method (25, PEAP) at invalidate | |
ENGINE: engine deinit | |
wpa_dbus_dict_get_entry: dict entry key: password | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=6): [REMOVED] | |
password - hexdump_ascii(len=6): [REMOVED] | |
wpa_dbus_dict_get_entry: dict entry key: phase1 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase1 - hexdump_ascii(len=9): | |
70 65 61 70 76 65 72 3d 30 peapver=0 | |
wpa_dbus_dict_get_entry: dict entry key: eap | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 | |
wpa_dbus_dict_get_entry: dict entry key: phase2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
phase2 - hexdump_ascii(len=13): | |
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 | |
wpa_dbus_dict_get_entry: dict entry key: ca_path | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=7): [REMOVED] | |
ssid - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wpa_dbus_dict_get_entry: dict entry key: key_mgmt | |
wpa_dbus_dict_get_entry: dict entry variant content type: s | |
_wpa_dbus_dict_fill_value_from_variant: string value: [omitted] | |
key_mgmt: 0x1 | |
wpa_dbus_dict_get_entry: dict entry key: identity | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=12): [REMOVED] | |
identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 USER_LOGIN_OMITTED | |
wpa_dbus_dict_get_entry: dict entry key: scan_ssid | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1 | |
scan_ssid=1 (0x1) | |
wpa_dbus_dict_get_entry: dict entry key: fragment_size | |
wpa_dbus_dict_get_entry: dict entry variant content type: i | |
_wpa_dbus_dict_fill_value_from_variant: int32 value: 1266 | |
fragment_size=1266 (0x4f2) | |
wpa_dbus_dict_get_entry: dict entry key: ca_path2 | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=14): [REMOVED] | |
ca_path2 - hexdump_ascii(len=14): | |
2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 /etc/ssl/certs | |
wpa_dbus_dict_get_entry: dict entry key: bgscan | |
wpa_dbus_dict_get_entry: dict entry variant content type: a | |
_wpa_dbus_dict_entry_get_array: array_type y | |
dbus: byte array contents - hexdump(len=17): [REMOVED] | |
bgscan - hexdump_ascii(len=17): | |
73 69 6d 70 6c 65 3a 33 30 3a 2d 36 35 3a 33 30 simple:30:-65:30 | |
30 0 | |
dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
Fast associate: Old scan results | |
wlp1s0b1: Setting scan request: 0.000000 sec | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x1faeff0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x1faeff0 after 0.000016 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000059 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.659433 seconds | |
nl80211: Received scan results (4 BSSes) | |
wlp1s0b1: BSS: Start scan result update 9 | |
BSS: last_scan_res_used=4/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
wlp1s0b1: Radio work 'scan'@0x1faeff0 done in 0.660239 seconds | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:99:04:bf:42 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-61 freq=2412 | |
wlp1s0b1: skip - blacklisted (count=2 limit=0) | |
wlp1s0b1: 1: 00:3a:99:04:bf:43 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-62 freq=2412 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 2: 00:3a:98:f5:90:e2 ssid='eduroam' wpa_ie_len=32 rsn_ie_len=28 caps=0x431 level=-82 freq=2437 | |
wlp1s0b1: selected based on RSN IE | |
wlp1s0b1: selected BSS 00:3a:98:f5:90:e2 ssid='eduroam' | |
wlp1s0b1: Considering connect request: reassociate: 1 selected: 00:3a:98:f5:90:e2 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x1fbbe20 current_ssid=0x1fbbe20 | |
wlp1s0b1: Request association with 00:3a:98:f5:90:e2 | |
wlp1s0b1: Add radio work 'sme-connect'@0x1faeff0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'sme-connect'@0x1faeff0 after 0.000031 second wait | |
wlp1s0b1: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=0x1fbbe20 try_opportunistic=1 | |
RSN: Search for BSSID 00:3a:98:f5:90:e2 | |
RSN: Consider 00:3a:98:f5:90:e2 for OKC | |
RSN: No PMKSA cache entry found | |
wlp1s0b1: RSN: using IEEE 802.11i/D9.0 | |
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2 | |
wlp1s0b1: WPA: Selected mgmt group cipher 32 | |
WPA: set AP WPA IE - hexdump(len=34): dd 20 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 02 00 00 50 f2 01 00 40 96 00 00 00 | |
WPA: set AP RSN IE - hexdump(len=30): 30 1c 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 02 00 00 0f ac 01 00 40 96 00 28 00 | |
wlp1s0b1: WPA: using GTK TKIP | |
wlp1s0b1: WPA: using PTK CCMP | |
wlp1s0b1: WPA: using KEY_MGMT 802.1X | |
wlp1s0b1: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz) | |
wlp1s0b1: State: SCANNING -> AUTHENTICATING | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
wlp1s0b1: Determining shared radio frequencies (max len 1) | |
wlp1s0b1: Shared frequencies (len=0): completed iteration | |
nl80211: Authenticate (ifindex=2) | |
* bssid=00:3a:98:f5:90:e2 | |
* freq=2437 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1 | |
nl80211: New station 00:3a:98:f5:90:e2 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 | |
nl80211: Event message available | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2 | |
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 3a 98 f5 90 e2 e0 63 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp1s0b1: Event AUTH (11) received | |
wlp1s0b1: SME: Authentication response: peer=00:3a:98:f5:90:e2 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp1s0b1: set_disable_max_amsdu: -1 | |
wlp1s0b1: set_ampdu_factor: -1 | |
wlp1s0b1: set_ampdu_density: -1 | |
wlp1s0b1: set_disable_ht40: 0 | |
wlp1s0b1: set_disable_sgi: 0 | |
wlp1s0b1: set_disable_ldpc: 0 | |
wlp1s0b1: Trying to associate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz) | |
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
nl80211: Associate (ifindex=2) | |
* bssid=00:3a:98:f5:90:e2 | |
* freq=2437 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac02 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2 | |
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 3a 98 f5 90 e2 30 64 31 04 00 00 bc c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
nl80211: Associate event | |
wlp1s0b1: Event ASSOC (0) received | |
wlp1s0b1: Association info event | |
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
wlp1s0b1: freq=2437 MHz | |
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:98:f5:90:e2 | |
wlp1s0b1: Associated with 00:3a:98:f5:90:e2 | |
wlp1s0b1: WPA: Association event - clear replay counter | |
wlp1s0b1: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: enable timer tick | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec | |
wlp1s0b1: Cancelling scan request | |
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 | |
WMM AC: U-APSD queues=0x0 | |
WMM AC: Valid WMM association, WMM AC is enabled | |
nl80211: Event message available | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=3 | |
* type=0 | |
* alpha2=RU | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=RU | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=RU (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 40 MHz 20 mBm | |
nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS) | |
nl80211: 5650-5730 @ 40 MHz 30 mBm (DFS) | |
nl80211: 5735-5835 @ 40 MHz 30 mBm | |
nl80211: 57000-66000 @ 2160 MHz 40 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=50 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c 70 6f 72 74 69 64 3d 32 39 | |
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_PAE entering state RESTART | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 | |
EAP: EAP entering state IDENTITY | |
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started | |
EAP: Status notification: started (param=) | |
EAP: EAP-Request Identity data - hexdump_ascii(len=41): | |
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro | |
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 41 2c am,nasid=WiFi-A, | |
70 6f 72 74 69 64 3d 32 39 portid=29 | |
EAP: using real identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 USER_LOGIN_OMITTED | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:90:e2 | |
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=10 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state GET_METHOD | |
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 | |
EAP: Status notification: accept proposed method (param=PEAP) | |
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) | |
EAP-PEAP: Forced PEAP version 0 | |
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 | |
TLS: using phase1 config options | |
TLS: Trusted root certificate(s) loaded | |
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=6) - Flags 0x20 | |
EAP-PEAP: Start (server ver=0, own ver=0) | |
EAP-PEAP: Using PEAP version 0 | |
SSL: (where=0x10 ret=0x1) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:before/connect initialization | |
OpenSSL: TX ver=0x303 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x303 content_type=22 | |
OpenSSL: Message - hexdump(len=298): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:SSLv2/v3 write client hello A | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in SSLv2/v3 read server hello A | |
SSL: SSL_connect - want more data | |
SSL: 303 bytes pending from ssl_out | |
SSL: 303 bytes left to be sent out (of total 303 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1fb5de0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:90:e2 | |
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 2a 65 7b 21 f7 76 64 ae 5d 0d fa 55 b6 58 a4 78 ce 70 53 7b d2 24 38 33 84 5d 8d 39 97 b8 2d b2 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01 | |
EAPOL: SUPP_BE entering state RECEIVE | |
EAPOL: startWhen --> 0 | |
nl80211: Event message available | |
nl80211: Drv Event 64 (NL80211_CMD_NOTIFY_CQM) received for wlp1s0b1 | |
nl80211: Event message available | |
nl80211: Drv Event 64 (NL80211_CMD_NOTIFY_CQM) received for wlp1s0b1 | |
nl80211: Event message available | |
nl80211: Drv Event 64 (NL80211_CMD_NOTIFY_CQM) received for wlp1s0b1 | |
nl80211: Event message available | |
nl80211: Drv Event 64 (NL80211_CMD_NOTIFY_CQM) received for wlp1s0b1 | |
nl80211: Event message available | |
nl80211: Drv Event 64 (NL80211_CMD_NOTIFY_CQM) received for wlp1s0b1 | |
nl80211: Event message available | |
nl80211: Drv Event 64 (NL80211_CMD_NOTIFY_CQM) received for wlp1s0b1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1 | |
nl80211: Delete station 00:3a:98:f5:90:e2 | |
nl80211: Event message available | |
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:98:f5:90:e2 A2=74:2f:68:d2:b1:f3 | |
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 98 f5 90 e2 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 00 04 00 | |
nl80211: Deauthenticate event | |
wlp1s0b1: Event DEAUTH (12) received | |
wlp1s0b1: Deauthentication notification | |
wlp1s0b1: * reason 4 (locally generated) | |
wlp1s0b1: * address 00:3a:98:f5:90:e2 | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:98:f5:90:e2 reason=4 locally_generated=1 | |
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6) | |
wlp1s0b1: Setting scan request: 0.100000 sec | |
wlp1s0b1: Radio work 'sme-connect'@0x1faeff0 done in 22.468515 seconds | |
Added BSSID 00:3a:98:f5:90:e2 into blacklist | |
Continuous association failures - consider temporary network disabling | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=CONN_FAILED | |
wlp1s0b1: Blacklist count 5 --> request scan in 10000 ms | |
wlp1s0b1: Ignore new scan request for 10.000000 sec since an earlier request is scheduled to trigger sooner | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Disconnect event - remove keys | |
wlp1s0b1: State: ASSOCIATED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WMM AC: WMM AC is disabled | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
nl80211: Event message available | |
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1 | |
nl80211: Ignore disconnect event when using userspace SME | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=0 | |
* type=1 | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=00 | |
nl80211: 2402-2472 @ 40 MHz 20 mBm | |
nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR) | |
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) | |
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) | |
nl80211: 57240-63720 @ 2160 MHz 0 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
nl80211: Event message available | |
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp1s0b1 | |
nl80211: Regulatory domain change | |
* initiator=1 | |
* type=0 | |
* alpha2=BY | |
wlp1s0b1: Event CHANNEL_LIST_CHANGED (28) received | |
wlp1s0b1: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=BY | |
wlp1s0b1: Updating hw mode | |
nl80211: Regulatory information - country=BY (DFS-ETSI) | |
nl80211: 2402-2482 @ 40 MHz 20 mBm | |
nl80211: 5170-5250 @ 80 MHz 20 mBm | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) | |
nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS) | |
nl80211: Added 802.11b mode based on 802.11g information | |
wlp1s0b1: State: DISCONNECTED -> SCANNING | |
Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x1fb2e60 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x1fb2e60 after 0.000021 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000061 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
EAPOL: disable timer tick | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID 'eduroam' | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.676683 seconds | |
nl80211: Received scan results (3 BSSes) | |
wlp1s0b1: BSS: Start scan result update 10 | |
BSS: last_scan_res_used=3/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
wlp1s0b1: Radio work 'scan'@0x1fb2e60 done in 0.677391 seconds | |
wlp1s0b1: Postpone network selection by 9 seconds since all networks are disabled | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) [o] | |
dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) [] | |
dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) [a{sv}] | |
wlp1s0b1: Add radio work 'scan'@0x1fb2410 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x1fb2410 after 0.000099 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan SSID - hexdump_ascii(len=11): | |
73 65 72 67 65 69 5f 61 73 75 73 sergei_asus | |
nl80211: Scan SSID - hexdump_ascii(len=13): | |
73 65 72 67 65 69 5f 67 61 6c 61 78 79 sergei_galaxy | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000062 seconds | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan probed for SSID 'sergei_asus' | |
nl80211: Scan probed for SSID 'sergei_galaxy' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.686140 seconds | |
nl80211: Received scan results (3 BSSes) | |
wlp1s0b1: BSS: Start scan result update 11 | |
wlp1s0b1: BSS: Remove id 4 BSSID 00:3a:99:d2:61:60 SSID 'BSU-Conference' due to no match in scan | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4' | |
BSS: last_scan_res_used=3/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
wlp1s0b1: Radio work 'scan'@0x1fb2410 done in 0.686916 seconds | |
wlp1s0b1: No APs found - clear blacklist and try again | |
Removed BSSID 00:3a:98:f5:90:e2 from blacklist (clear) | |
Removed BSSID 00:3a:99:04:bf:42 from blacklist (clear) | |
wlp1s0b1: No suitable network found | |
wlp1s0b1: Short-circuit new scan request since there are no enabled networks | |
wlp1s0b1: State: SCANNING -> INACTIVE | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 | |
dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 | |
wlp1s0b1: Removing interface wlp1s0b1 | |
wlp1s0b1: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=INACTIVE | |
TDLS: Tear down peers | |
wlp1s0b1: State: INACTIVE -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit | |
ENGINE: engine deinit | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: BSS: Remove id 1 BSSID 00:3a:99:04:bf:42 SSID 'eduroam' due to wpa_bss_flush | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1' | |
wlp1s0b1: BSS: Remove id 0 BSSID 00:3a:99:04:bf:43 SSID 'test' due to wpa_bss_flush | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0' | |
wlp1s0b1: BSS: Remove id 3 BSSID 00:3a:98:f5:90:e2 SSID 'eduroam' due to wpa_bss_flush | |
dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3' | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: Cancelling authentication timeout | |
Remove interface wlp1s0b1 from radio phy0 | |
Remove radio phy0 | |
nl80211: deinit ifname=wlp1s0b1 disabled_11b_rates=0 | |
nl80211: Remove monitor interface: refcount=0 | |
netlink: Operstate: ifindex=2 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) | |
nl80211: Set mode ifindex 2 iftype 2 (STATION) | |
nl80211: Unsubscribe mgmt frames handle 0x8888888889706779 (mode change) | |
dbus: Unregister interface object '/fi/w1/wpa_supplicant1/Interfaces/1' | |
wlp1s0b1: CTRL-EVENT-TERMINATING | |
dbus: Unregister D-Bus object '/fi/w1/wpa_supplicant1' |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment