Modify

Opened 7 years ago

Closed 7 years ago

Last modified 4 years ago

#7936 closed defect (worksforme)

Since r22854 WDS doesn't work anymore

Reported by: anonymous Owned by: nbd
Priority: normal Milestone: Barrier Breaker 14.07
Component: packages Version: Trunk
Keywords: Cc:

Description

Hello,

since this change:

[22854]   	13 days  	nbd  	 hostapd: backport a fix to check for STA STBC capabilities before setting …

My other client router doesn't work anymore in WDS mode. It cannot associate with my main router. It was working fine before.

Thank you.

Pitou!

Attachments (0)

Change History (16)

comment:1 Changed 7 years ago by anonymous

Config for the main router

config 'wifi-device' 'radio0'
        option 'type' 'mac80211'
        option 'macaddr' '00:26:5a:be:a9:b8'
        option 'hwmode' '11ng'
        option 'disabled' '0'
        option 'channel' '9'
        list 'ht_capab' 'SHORT-GI-40'
        list 'ht_capab' 'TX-STBC'
        list 'ht_capab' 'RX-STBC1'
        list 'ht_capab' 'DSSS_CCK-40'
        option 'htmode' 'HT40-'

config 'wifi-iface'
        option 'device' 'radio0'
        option 'ssid' 'Univers'
        option 'network' 'lan'
        option 'mode' 'ap'
        option 'encryption' 'psk2'
        option 'key' <removed>

config 'wifi-iface'
        option 'device' 'radio0'
        option 'network' 'lan'
        option 'mode' 'ap'
        option 'wds' '1'
        option 'ssid' 'UniversWDS'
        option 'encryption' 'psk2'
        option 'key' <removed>

Config for the client router

config 'wifi-device' 'radio0'
        option 'type' 'mac80211'
        option 'macaddr' '00:23:cd:17:26:92'
        option 'hwmode' '11ng'
        list 'ht_capab' 'SHORT-GI-40'
        list 'ht_capab' 'TX-STBC'
        list 'ht_capab' 'RX-STBC1'
        list 'ht_capab' 'DSSS_CCK-40'
        option 'disabled' '0'
        option 'channel' '9'
        option 'htmode' 'HT40-'

config 'wifi-iface'
        option 'device' 'radio0'
        option 'network' 'lan'
        option 'ssid' 'UniversWDS'
        option 'mode' 'sta'
        option 'wds' '1'
        option 'encryption' 'psk2'
        option 'key' <removed>

And btw, normal PC/laptop works fine.

Pitou!

comment:2 Changed 7 years ago by jow

  • Owner changed from developers to nbd
  • Status changed from new to assigned

comment:3 Changed 7 years ago by anonymous

I did some more tests and it seems that it's the 2nd virtual interface/ssid that doesn't work.

Pitou!

comment:4 Changed 7 years ago by nbd

  • Resolution set to fixed
  • Status changed from assigned to closed

fixed in r23059

comment:5 Changed 7 years ago by anonymous

  • Resolution fixed deleted
  • Status changed from closed to reopened

It does work but stays connected for a couple seconds then disconnect. It does that in a loop manner.

Pitou!

comment:6 Changed 7 years ago by nbd

Which revision did you use exactly?

comment:7 Changed 7 years ago by anonymous

Revision r23060 on both end. And both devices use the ath9k driver.

Thanks for the hard work, btw...

Pitou!

comment:8 Changed 7 years ago by nbd

Can you please test whether r23061 is any better?

I'm also working on some fixes for crash issues that I found in wpa_supplicant by the way, I'll let you know when they are complete.

comment:9 Changed 7 years ago by nbd

ok, wpa_supplicant is fixed now. please upgrade to r23067 instead

comment:10 Changed 7 years ago by anonymous

Unfortunately, it still doesn't work for WDS.

Also something else happened. Traffic doesn't pass for normal wireless PC/laptop.
It does connect, but cannot reach the internet. A ping to google from the router works fine.

Pitou!

comment:11 Changed 7 years ago by anonymous

Release r23070

comment:12 Changed 7 years ago by nbd

Does it still have the same symptoms for WDS? If so, please run wpa_supplicant manually on the WDS station with a command like this:

killall wpa_supplicant; sleep 1; wpa_supplicant -b br-lan -dd -P /var/run/wifi-wlan0.pid -Dnl80211 -iwlan0 -c /var/run/wpa_supplicant-wlan0.conf 2>&1 | tee /tmp/log.txt
and attach /tmp/log.txt to this ticket (after it has reconnected a few times)

comment:13 Changed 7 years ago by anonymous

Here it is

Initializing interface 'wlan0' conf '/var/run/wpa_supplicant-wlan0.conf' driver 'nl80211' ctrl_interface 'N/A' bridge 'br-lan'
Configuration file '/var/run/wpa_supplicant-wlan0.conf' -> '/var/run/wpa_supplicant-wlan0.conf'
Reading configuration file '/var/run/wpa_supplicant-wlan0.conf'
ctrl_interface='/var/run/wpa_supplicant-wlan0'
Line: 2 - start of a new network block
scan_ssid=1 (0x1)
ssid - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
key_mgmt: 0x2
proto: 0x2
PSK (ASCII passphrase) - hexdump_ascii(len=63): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='UniversWDS'
netlink: Operstate: linkmode=1, operstate=5
nl80211: Register Action command failed: ret=-149 (Operation already in progress)
nl80211: Register Action match - hexdump(len=1): 06
nl80211: Failed to register Action frame processing - ignore for now
Own MAC address: 00:23:cd:17:26:92
Receiving packets from bridge interface 'br-lan'
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=5 set_tx=0 seq_len=0 key_len=0
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
Added interface wlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
nl80211: Interface down
Interface was disabled
State: DISCONNECTED -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
State: DISCONNECTED -> INTERFACE_DISABLED
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
nl80211: Interface up
Interface was enabled
State: INTERFACE_DISABLED -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Not rescheduling scan to ensure that specific SSID scans occur
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Trying to get current scan results first without requesting a new scan to speed up initial association
Received scan results (2 BSSes)
BSS: Start scan result update 1
BSS: Add new id 0 BSSID 06:26:5a:be:a9:b8 SSID 'UniversWDS'
BSS: Add new id 1 BSSID 00:26:5a:be:a9:b8 SSID 'Univers'
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 06:26:5a:be:a9:b8 ssid='UniversWDS' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-52
   selected based on RSN IE
   selected WPA AP 06:26:5a:be:a9:b8 ssid='UniversWDS'
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
Cancelling scan request
Trying to authenticate with 06:26:5a:be:a9:b8 (SSID='UniversWDS' freq=2452 MHz)
No keys have been configured - skip key clearing
State: DISCONNECTED -> AUTHENTICATING
nl80211: Authenticate (ifindex=6)
  * bssid=06:26:5a:be:a9:b8
  * freq=2452
  * SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
  * IEs - hexdump(len=0): [NULL]
  * Auth Type 0
nl80211: Authentication request send successfully
nl80211: Event message available
nl80211: MLME event 37
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 b0 94 00 00 02 00 00 00
SME: Authentication response: peer=06:26:5a:be:a9:b8 auth_type=0 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
Trying to associate with 06:26:5a:be:a9:b8 (SSID='UniversWDS' freq=2452 MHz)
State: AUTHENTICATING -> ASSOCIATING
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Associate (ifindex=6)
  * bssid=06:26:5a:be:a9:b8
  * freq=2452
  * SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
  * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Association request send successfully
nl80211: Event message available
nl80211: Ignored unknown event (cmd=19)
nl80211: Event message available
nl80211: MLME event 38
nl80211: MLME event frame - hexdump(len=124): 10 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 d0 94 11 04 00 00 01 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 09 07 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Association info event
resp_ies - hexdump(len=94): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 09 07 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
freq=2452 MHz
State: ASSOCIATING -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=06:26:5a:be:a9:b8
No keys have been configured - skip key clearing
Associated with 06:26:5a:be:a9:b8
WPA: Association event - clear replay counter
WPA: Clear old PTK
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
nl80211: Event message available
nl80211: Ignore connect event (cmd=46) when using userspace SME
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 16
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 0c 00 00 88 aa 0d c3 10 80 b0 ac 04 10 c8 ad d4 ca 07 9f 52 45 e9 5d cb f3 cf e1 af 98 49 86 f4
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 0c 00 00 88 aa 0d c3 10 80 b0 ac 04 10 c8 ad d4 ca 07 9f 52 45 e9 5d cb f3 cf e1 af 98 49 86 f4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9c 3b 88 ce 80 84 b4 d6 12 48 e8 05 e5 79 a7 e7 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 16
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 0c 00 00 88 aa 0d c3 10 80 b0 ac 04 10 c8 ad d4 ca 07 9f 52 45 e9 5d cb f3 cf e1 af 98 49 86 f4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3b e9 a6 a1 fc 46 f3 49 4f 3b 1a 75 78 3e fc a4 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 16
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 0c 00 00 88 aa 0d c3 10 80 b0 ac 04 10 c8 ad d4 ca 07 9f 52 45 e9 5d cb f3 cf e1 af 98 49 86 f4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14 95 e9 1a 22 25 6d df 1c 2c 74 4b 76 17 ca c0 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Event message available
nl80211: MLME event 39
nl80211: MLME event frame - hexdump(len=26): c0 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 30 99 02 00
Deauthentication notification
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
Added BSSID 06:26:5a:be:a9:b8 into blacklist
CTRL-EVENT-DISCONNECTED bssid=06:26:5a:be:a9:b8 reason=2
Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=5 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x4781bc key_idx=0 set_tx=0 seq_len=0 key_len=0
   addr=06:26:5a:be:a9:b8
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: Event message available
nl80211: Ignore disconnect event when using userspace SME
State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
Include wildcard SSID in the scan request
Starting AP scan for specific SSID(s)
nl80211: Scan SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
Scan requested (ret=0) - scan timeout 10 seconds
nl80211: Event message available
nl80211: Scan trigger
nl80211: Event message available
nl80211: New scan results available
Received scan results (2 BSSes)
BSS: Start scan result update 2
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 06:26:5a:be:a9:b8 ssid='UniversWDS' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-52
   selected based on RSN IE
   selected WPA AP 06:26:5a:be:a9:b8 ssid='UniversWDS'
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
Cancelling scan request
Trying to authenticate with 06:26:5a:be:a9:b8 (SSID='UniversWDS' freq=2452 MHz)
No keys have been configured - skip key clearing
State: SCANNING -> AUTHENTICATING
nl80211: Authenticate (ifindex=6)
  * bssid=06:26:5a:be:a9:b8
  * freq=2452
  * SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
  * IEs - hexdump(len=0): [NULL]
  * Auth Type 0
nl80211: Authentication request send successfully
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: Event message available
nl80211: MLME event 37
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 40 9c 00 00 02 00 00 00
SME: Authentication response: peer=06:26:5a:be:a9:b8 auth_type=0 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
Trying to associate with 06:26:5a:be:a9:b8 (SSID='UniversWDS' freq=2452 MHz)
State: AUTHENTICATING -> ASSOCIATING
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Associate (ifindex=6)
  * bssid=06:26:5a:be:a9:b8
  * freq=2452
  * SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
  * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  * prev_bssid=06:26:5a:be:a9:b8
nl80211: Association request send successfully
nl80211: Event message available
nl80211: Ignored unknown event (cmd=19)
nl80211: Event message available
nl80211: MLME event 38
nl80211: MLME event frame - hexdump(len=124): 30 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 60 9c 11 04 00 00 01 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 09 07 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Association info event
resp_ies - hexdump(len=94): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 09 07 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
freq=2452 MHz
State: ASSOCIATING -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=06:26:5a:be:a9:b8
No keys have been configured - skip key clearing
Associated with 06:26:5a:be:a9:b8
WPA: Association event - clear replay counter
WPA: Clear old PTK
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
nl80211: Event message available
nl80211: Ignore connect event (cmd=46) when using userspace SME
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 17
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): e3 06 e4 99 05 db c6 fe 6e 94 7f 51 3b a8 00 3d 03 c1 55 ef ea 39 71 29 5f d4 b5 81 ec ad 9d 69
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 e3 06 e4 99 05 db c6 fe 6e 94 7f 51 3b a8 00 3d 03 c1 55 ef ea 39 71 29 5f d4 b5 81 ec ad 9d 69 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 77 9c 8f 69 bb 8f a9 51 73 08 e2 5a 8d c8 13 f1 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 17
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 e3 06 e4 99 05 db c6 fe 6e 94 7f 51 3b a8 00 3d 03 c1 55 ef ea 39 71 29 5f d4 b5 81 ec ad 9d 69 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e5 e8 85 fe 09 a9 24 c6 1f f4 40 a2 0e 26 6f 68 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 17
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 e3 06 e4 99 05 db c6 fe 6e 94 7f 51 3b a8 00 3d 03 c1 55 ef ea 39 71 29 5f d4 b5 81 ec ad 9d 69 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ce c2 39 35 22 42 05 d0 1e ee f4 43 fd 2a 58 de 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Event message available
nl80211: MLME event 39
nl80211: MLME event frame - hexdump(len=26): c0 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 e0 a0 02 00
Deauthentication notification
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
BSSID 06:26:5a:be:a9:b8 blacklist count incremented to 2
CTRL-EVENT-DISCONNECTED bssid=06:26:5a:be:a9:b8 reason=2
Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=5 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x4781bc key_idx=0 set_tx=0 seq_len=0 key_len=0
   addr=06:26:5a:be:a9:b8
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: Event message available
nl80211: Ignore disconnect event when using userspace SME
State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
Include wildcard SSID in the scan request
Starting AP scan for specific SSID(s)
nl80211: Scan SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Scan trigger
nl80211: Event message available
nl80211: New scan results available
Received scan results (3 BSSes)
BSS: Start scan result update 3
BSS: Add new id 2 BSSID 00:1c:10:ac:b2:d2 SSID 'FamilleOdette'
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:26:5a:be:a9:b8 ssid='Univers' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-49
   skip - SSID mismatch
1: 06:26:5a:be:a9:b8 ssid='UniversWDS' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-53
   skip - blacklisted
2: 00:1c:10:ac:b2:d2 ssid='FamilleOdette' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-88
   skip - SSID mismatch
Try to find non-WPA AP
0: 00:26:5a:be:a9:b8 ssid='Univers' wpa_ie_len=0 rsn_ie_len=20 caps=0x411
   skip - SSID mismatch
1: 06:26:5a:be:a9:b8 ssid='UniversWDS' wpa_ie_len=0 rsn_ie_len=20 caps=0x411
   skip - blacklisted
2: 00:1c:10:ac:b2:d2 ssid='FamilleOdette' wpa_ie_len=24 rsn_ie_len=0 caps=0x411
   skip - SSID mismatch
No APs found - clear blacklist and try again
Removed BSSID 06:26:5a:be:a9:b8 from blacklist (clear)
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:26:5a:be:a9:b8 ssid='Univers' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-49
   skip - SSID mismatch
1: 06:26:5a:be:a9:b8 ssid='UniversWDS' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-53
   selected based on RSN IE
   selected WPA AP 06:26:5a:be:a9:b8 ssid='UniversWDS'
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
Cancelling scan request
Trying to authenticate with 06:26:5a:be:a9:b8 (SSID='UniversWDS' freq=2452 MHz)
No keys have been configured - skip key clearing
State: SCANNING -> AUTHENTICATING
nl80211: Authenticate (ifindex=6)
  * bssid=06:26:5a:be:a9:b8
  * freq=2452
  * SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
  * IEs - hexdump(len=0): [NULL]
  * Auth Type 0
nl80211: Authentication request send successfully
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: Event message available
nl80211: MLME event 37
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 d0 a3 00 00 02 00 00 00
SME: Authentication response: peer=06:26:5a:be:a9:b8 auth_type=0 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
Trying to associate with 06:26:5a:be:a9:b8 (SSID='UniversWDS' freq=2452 MHz)
State: AUTHENTICATING -> ASSOCIATING
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Associate (ifindex=6)
  * bssid=06:26:5a:be:a9:b8
  * freq=2452
  * SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
  * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  * prev_bssid=06:26:5a:be:a9:b8
nl80211: Association request send successfully
nl80211: Event message available
nl80211: Ignored unknown event (cmd=19)
nl80211: Event message available
nl80211: MLME event 38
nl80211: MLME event frame - hexdump(len=124): 30 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 f0 a3 11 04 00 00 01 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 09 07 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Association info event
resp_ies - hexdump(len=94): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 09 07 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
freq=2452 MHz
State: ASSOCIATING -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=06:26:5a:be:a9:b8
No keys have been configured - skip key clearing
Associated with 06:26:5a:be:a9:b8
WPA: Association event - clear replay counter
WPA: Clear old PTK
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
nl80211: Event message available
nl80211: Ignore connect event (cmd=46) when using userspace SME
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 18
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 70 1f 66 47 19 fd c4 bf 85 80 c5 de 02 c7 9c 59 f5 ec c2 eb 34 4a a6 ae 4b ce 34 26 8a 96 b5 98
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 70 1f 66 47 19 fd c4 bf 85 80 c5 de 02 c7 9c 59 f5 ec c2 eb 34 4a a6 ae 4b ce 34 26 8a 96 b5 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 74 71 d7 80 24 f2 b5 80 8b 4a 38 b6 a4 ae 4e bc 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 18
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 70 1f 66 47 19 fd c4 bf 85 80 c5 de 02 c7 9c 59 f5 ec c2 eb 34 4a a6 ae 4b ce 34 26 8a 96 b5 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4c ce 48 14 b5 2b da 41 8c 10 61 70 7a da 90 ff 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 18
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 70 1f 66 47 19 fd c4 bf 85 80 c5 de 02 c7 9c 59 f5 ec c2 eb 34 4a a6 ae 4b ce 34 26 8a 96 b5 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c2 4b e2 26 88 c1 d8 34 f8 ab 53 8c ff 88 d9 1a 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Event message available
nl80211: MLME event 39
nl80211: MLME event frame - hexdump(len=26): c0 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 50 a8 02 00
Deauthentication notification
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
Added BSSID 06:26:5a:be:a9:b8 into blacklist
CTRL-EVENT-DISCONNECTED bssid=06:26:5a:be:a9:b8 reason=2
Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=5 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x4781bc key_idx=0 set_tx=0 seq_len=0 key_len=0
   addr=06:26:5a:be:a9:b8
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: Event message available
nl80211: Ignore disconnect event when using userspace SME
State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
Include wildcard SSID in the scan request
Starting AP scan for specific SSID(s)
nl80211: Scan SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Scan trigger
nl80211: Event message available
nl80211: New scan results available
Received scan results (3 BSSes)
BSS: Start scan result update 4
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:26:5a:be:a9:b8 ssid='Univers' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-49
   skip - SSID mismatch
1: 06:26:5a:be:a9:b8 ssid='UniversWDS' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-51
   selected based on RSN IE
   selected WPA AP 06:26:5a:be:a9:b8 ssid='UniversWDS'
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
Cancelling scan request
Trying to authenticate with 06:26:5a:be:a9:b8 (SSID='UniversWDS' freq=2452 MHz)
No keys have been configured - skip key clearing
State: SCANNING -> AUTHENTICATING
nl80211: Authenticate (ifindex=6)
  * bssid=06:26:5a:be:a9:b8
  * freq=2452
  * SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
  * IEs - hexdump(len=0): [NULL]
  * Auth Type 0
nl80211: Authentication request send successfully
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: Event message available
nl80211: MLME event 37
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 20 ab 00 00 02 00 00 00
SME: Authentication response: peer=06:26:5a:be:a9:b8 auth_type=0 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
Trying to associate with 06:26:5a:be:a9:b8 (SSID='UniversWDS' freq=2452 MHz)
State: AUTHENTICATING -> ASSOCIATING
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Associate (ifindex=6)
  * bssid=06:26:5a:be:a9:b8
  * freq=2452
  * SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
  * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  * prev_bssid=06:26:5a:be:a9:b8
nl80211: Association request send successfully
nl80211: Event message available
nl80211: Ignored unknown event (cmd=19)
nl80211: Event message available
nl80211: MLME event 38
nl80211: MLME event frame - hexdump(len=124): 30 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 40 ab 11 04 00 00 01 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 09 07 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Association info event
resp_ies - hexdump(len=94): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 09 07 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
freq=2452 MHz
State: ASSOCIATING -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=06:26:5a:be:a9:b8
No keys have been configured - skip key clearing
Associated with 06:26:5a:be:a9:b8
WPA: Association event - clear replay counter
WPA: Clear old PTK
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
nl80211: Event message available
nl80211: Ignore connect event (cmd=46) when using userspace SME
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 19
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 5f 44 9f b4 64 23 28 97 39 b0 b0 6a 6c b4 48 b4 24 07 11 98 2a e0 b7 9c b4 8e 90 ec d2 68 5d 06
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 5f 44 9f b4 64 23 28 97 39 b0 b0 6a 6c b4 48 b4 24 07 11 98 2a e0 b7 9c b4 8e 90 ec d2 68 5d 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b9 bd 2b be 83 fc 1f e0 39 be 43 3c 0d a5 17 b7 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 19
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 5f 44 9f b4 64 23 28 97 39 b0 b0 6a 6c b4 48 b4 24 07 11 98 2a e0 b7 9c b4 8e 90 ec d2 68 5d 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a4 4c 3e fb bd d3 cb 52 50 43 5c b7 7b 90 59 88 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 19
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 5f 44 9f b4 64 23 28 97 39 b0 b0 6a 6c b4 48 b4 24 07 11 98 2a e0 b7 9c b4 8e 90 ec d2 68 5d 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 93 88 7b 8d 67 ed b9 b1 e3 a1 f8 84 e3 1f 3d b0 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Event message available
nl80211: MLME event 39
nl80211: MLME event frame - hexdump(len=26): c0 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 c0 af 02 00
Deauthentication notification
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
BSSID 06:26:5a:be:a9:b8 blacklist count incremented to 2
CTRL-EVENT-DISCONNECTED bssid=06:26:5a:be:a9:b8 reason=2
Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=5 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x4781bc key_idx=0 set_tx=0 seq_len=0 key_len=0
   addr=06:26:5a:be:a9:b8
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: Event message available
nl80211: Ignore disconnect event when using userspace SME
State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
Include wildcard SSID in the scan request
Starting AP scan for specific SSID(s)
nl80211: Scan SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Scan trigger
nl80211: Event message available
nl80211: New scan results available
Received scan results (3 BSSes)
BSS: Start scan result update 5
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 06:26:5a:be:a9:b8 ssid='UniversWDS' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-53
   skip - blacklisted
1: 00:26:5a:be:a9:b8 ssid='Univers' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-53
   skip - SSID mismatch
2: 00:1c:10:ac:b2:d2 ssid='FamilleOdette' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-88
   skip - SSID mismatch
Try to find non-WPA AP
0: 06:26:5a:be:a9:b8 ssid='UniversWDS' wpa_ie_len=0 rsn_ie_len=20 caps=0x411
   skip - blacklisted
1: 00:26:5a:be:a9:b8 ssid='Univers' wpa_ie_len=0 rsn_ie_len=20 caps=0x411
   skip - SSID mismatch
2: 00:1c:10:ac:b2:d2 ssid='FamilleOdette' wpa_ie_len=24 rsn_ie_len=0 caps=0x411
   skip - SSID mismatch
No APs found - clear blacklist and try again
Removed BSSID 06:26:5a:be:a9:b8 from blacklist (clear)
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 06:26:5a:be:a9:b8 ssid='UniversWDS' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-53
   selected based on RSN IE
   selected WPA AP 06:26:5a:be:a9:b8 ssid='UniversWDS'
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
Cancelling scan request
Trying to authenticate with 06:26:5a:be:a9:b8 (SSID='UniversWDS' freq=2452 MHz)
No keys have been configured - skip key clearing
State: SCANNING -> AUTHENTICATING
nl80211: Authenticate (ifindex=6)
  * bssid=06:26:5a:be:a9:b8
  * freq=2452
  * SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
  * IEs - hexdump(len=0): [NULL]
  * Auth Type 0
nl80211: Authentication request send successfully
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: Event message available
nl80211: MLME event 37
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 c0 b2 00 00 02 00 00 00
SME: Authentication response: peer=06:26:5a:be:a9:b8 auth_type=0 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
Trying to associate with 06:26:5a:be:a9:b8 (SSID='UniversWDS' freq=2452 MHz)
State: AUTHENTICATING -> ASSOCIATING
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Associate (ifindex=6)
  * bssid=06:26:5a:be:a9:b8
  * freq=2452
  * SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
  * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  * prev_bssid=06:26:5a:be:a9:b8
nl80211: Association request send successfully
nl80211: Event message available
nl80211: Ignored unknown event (cmd=19)
nl80211: Event message available
nl80211: MLME event 38
nl80211: MLME event frame - hexdump(len=124): 30 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 e0 b2 11 04 00 00 01 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 09 07 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Association info event
resp_ies - hexdump(len=94): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 09 07 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
freq=2452 MHz
State: ASSOCIATING -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=06:26:5a:be:a9:b8
No keys have been configured - skip key clearing
Associated with 06:26:5a:be:a9:b8
WPA: Association event - clear replay counter
WPA: Clear old PTK
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
nl80211: Event message available
nl80211: Ignore connect event (cmd=46) when using userspace SME
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1a
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 1c 20 03 ae ca f1 d5 5c ff 1e 0b 48 36 fa 1e a6 a3 39 45 1e c5 e6 43 37 36 0c aa 83 98 f1 f2 4c
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 1c 20 03 ae ca f1 d5 5c ff 1e 0b 48 36 fa 1e a6 a3 39 45 1e c5 e6 43 37 36 0c aa 83 98 f1 f2 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a9 1e ee d4 fa 69 42 4e b2 9d 02 a1 01 cd c4 39 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1a
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 1c 20 03 ae ca f1 d5 5c ff 1e 0b 48 36 fa 1e a6 a3 39 45 1e c5 e6 43 37 36 0c aa 83 98 f1 f2 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 f5 4a c4 2e e8 7c 50 68 b5 2a 8a 38 1e 52 5a 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1a
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 1c 20 03 ae ca f1 d5 5c ff 1e 0b 48 36 fa 1e a6 a3 39 45 1e c5 e6 43 37 36 0c aa 83 98 f1 f2 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2a 61 b7 17 fb 75 7d d4 38 f1 28 2e 27 c7 e8 79 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Event message available
nl80211: MLME event 39
nl80211: MLME event frame - hexdump(len=26): c0 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 40 b7 02 00
Deauthentication notification
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
Added BSSID 06:26:5a:be:a9:b8 into blacklist
CTRL-EVENT-DISCONNECTED bssid=06:26:5a:be:a9:b8 reason=2
Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=5 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x4781bc key_idx=0 set_tx=0 seq_len=0 key_len=0
   addr=06:26:5a:be:a9:b8
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: Event message available
nl80211: Ignore disconnect event when using userspace SME
State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
Include wildcard SSID in the scan request
Starting AP scan for specific SSID(s)
nl80211: Scan SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Scan trigger
nl80211: Event message available
nl80211: New scan results available
Received scan results (3 BSSes)
BSS: Start scan result update 6
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:26:5a:be:a9:b8 ssid='Univers' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-53
   skip - SSID mismatch
1: 06:26:5a:be:a9:b8 ssid='UniversWDS' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-54
   selected based on RSN IE
   selected WPA AP 06:26:5a:be:a9:b8 ssid='UniversWDS'
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
Cancelling scan request
Trying to authenticate with 06:26:5a:be:a9:b8 (SSID='UniversWDS' freq=2452 MHz)
No keys have been configured - skip key clearing
State: SCANNING -> AUTHENTICATING
nl80211: Authenticate (ifindex=6)
  * bssid=06:26:5a:be:a9:b8
  * freq=2452
  * SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
  * IEs - hexdump(len=0): [NULL]
  * Auth Type 0
nl80211: Authentication request send successfully
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: Event message available
nl80211: MLME event 37
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 b0 ba 00 00 02 00 00 00
SME: Authentication response: peer=06:26:5a:be:a9:b8 auth_type=0 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
Trying to associate with 06:26:5a:be:a9:b8 (SSID='UniversWDS' freq=2452 MHz)
State: AUTHENTICATING -> ASSOCIATING
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Associate (ifindex=6)
  * bssid=06:26:5a:be:a9:b8
  * freq=2452
  * SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
  * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  * prev_bssid=06:26:5a:be:a9:b8
nl80211: Association request send successfully
nl80211: Event message available
nl80211: Ignored unknown event (cmd=19)
nl80211: Event message available
nl80211: MLME event 38
nl80211: MLME event frame - hexdump(len=124): 30 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 d0 ba 11 04 00 00 01 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 09 07 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Association info event
resp_ies - hexdump(len=94): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 09 07 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
freq=2452 MHz
State: ASSOCIATING -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=06:26:5a:be:a9:b8
No keys have been configured - skip key clearing
Associated with 06:26:5a:be:a9:b8
WPA: Association event - clear replay counter
WPA: Clear old PTK
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
nl80211: Event message available
nl80211: Ignore connect event (cmd=46) when using userspace SME
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 31 06 b9 1e 39 f7 e6 96 44 b1 c4 34 63 45 2c e8 a2 17 a1 74 94 54 99 25 59 0a c6 f2 b1 bc ea db
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 31 06 b9 1e 39 f7 e6 96 44 b1 c4 34 63 45 2c e8 a2 17 a1 74 94 54 99 25 59 0a c6 f2 b1 bc ea db 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bc d6 19 48 46 44 df a7 e3 65 cb 34 2e ab 8e c0 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 31 06 b9 1e 39 f7 e6 96 44 b1 c4 34 63 45 2c e8 a2 17 a1 74 94 54 99 25 59 0a c6 f2 b1 bc ea db 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 98 c5 9f 0d e5 9d 8a b9 ac 5a fb d3 00 f0 95 48 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 31 06 b9 1e 39 f7 e6 96 44 b1 c4 34 63 45 2c e8 a2 17 a1 74 94 54 99 25 59 0a c6 f2 b1 bc ea db 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4c 21 a9 d2 e8 06 ca 1e 96 d6 c2 13 dd 6e 50 d6 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Event message available
nl80211: MLME event 39
nl80211: MLME event frame - hexdump(len=26): c0 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 40 bf 02 00
Deauthentication notification
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
BSSID 06:26:5a:be:a9:b8 blacklist count incremented to 2
CTRL-EVENT-DISCONNECTED bssid=06:26:5a:be:a9:b8 reason=2
Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=5 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x4781bc key_idx=0 set_tx=0 seq_len=0 key_len=0
   addr=06:26:5a:be:a9:b8
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: Event message available
nl80211: Ignore disconnect event when using userspace SME
State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
Include wildcard SSID in the scan request
Starting AP scan for specific SSID(s)
nl80211: Scan SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Scan trigger
nl80211: Event message available
nl80211: New scan results available
Received scan results (2 BSSes)
BSS: Start scan result update 7
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:26:5a:be:a9:b8 ssid='Univers' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48
   skip - SSID mismatch
1: 06:26:5a:be:a9:b8 ssid='UniversWDS' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-49
   skip - blacklisted
Try to find non-WPA AP
0: 00:26:5a:be:a9:b8 ssid='Univers' wpa_ie_len=0 rsn_ie_len=20 caps=0x411
   skip - SSID mismatch
1: 06:26:5a:be:a9:b8 ssid='UniversWDS' wpa_ie_len=0 rsn_ie_len=20 caps=0x411
   skip - blacklisted
No APs found - clear blacklist and try again
Removed BSSID 06:26:5a:be:a9:b8 from blacklist (clear)
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:26:5a:be:a9:b8 ssid='Univers' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48
   skip - SSID mismatch
1: 06:26:5a:be:a9:b8 ssid='UniversWDS' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-49
   selected based on RSN IE
   selected WPA AP 06:26:5a:be:a9:b8 ssid='UniversWDS'
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
Cancelling scan request
Trying to authenticate with 06:26:5a:be:a9:b8 (SSID='UniversWDS' freq=2452 MHz)
No keys have been configured - skip key clearing
State: SCANNING -> AUTHENTICATING
nl80211: Authenticate (ifindex=6)
  * bssid=06:26:5a:be:a9:b8
  * freq=2452
  * SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
  * IEs - hexdump(len=0): [NULL]
  * Auth Type 0
nl80211: Authentication request send successfully
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: Event message available
nl80211: MLME event 37
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 50 c2 00 00 02 00 00 00
SME: Authentication response: peer=06:26:5a:be:a9:b8 auth_type=0 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
Trying to associate with 06:26:5a:be:a9:b8 (SSID='UniversWDS' freq=2452 MHz)
State: AUTHENTICATING -> ASSOCIATING
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Associate (ifindex=6)
  * bssid=06:26:5a:be:a9:b8
  * freq=2452
  * SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
  * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  * prev_bssid=06:26:5a:be:a9:b8
nl80211: Association request send successfully
nl80211: Event message available
nl80211: Ignored unknown event (cmd=19)
nl80211: Event message available
nl80211: MLME event 38
nl80211: MLME event frame - hexdump(len=124): 30 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 70 c2 11 04 00 00 01 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 09 07 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Association info event
resp_ies - hexdump(len=94): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 09 07 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
freq=2452 MHz
State: ASSOCIATING -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=06:26:5a:be:a9:b8
No keys have been configured - skip key clearing
Associated with 06:26:5a:be:a9:b8
WPA: Association event - clear replay counter
WPA: Clear old PTK
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
nl80211: Event message available
nl80211: Ignore connect event (cmd=46) when using userspace SME
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1c
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 42 a7 84 e1 58 5a d5 b0 2e 1f 6c f1 d4 de 68 d2 b8 c5 30 75 c3 74 46 ce 11 7e f6 1a 1a ad 67 cf
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 42 a7 84 e1 58 5a d5 b0 2e 1f 6c f1 d4 de 68 d2 b8 c5 30 75 c3 74 46 ce 11 7e f6 1a 1a ad 67 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 cd ad c7 b9 9a e3 90 12 3c 66 85 4d 54 16 2c 90 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1c
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 42 a7 84 e1 58 5a d5 b0 2e 1f 6c f1 d4 de 68 d2 b8 c5 30 75 c3 74 46 ce 11 7e f6 1a 1a ad 67 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9b a7 d1 5b 0a 5b 76 84 a9 a5 9d 3b 81 d1 d8 b0 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1c
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 42 a7 84 e1 58 5a d5 b0 2e 1f 6c f1 d4 de 68 d2 b8 c5 30 75 c3 74 46 ce 11 7e f6 1a 1a ad 67 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 11 95 96 b2 76 b1 12 05 56 1e e3 44 f8 a9 90 51 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Event message available
nl80211: MLME event 39
nl80211: MLME event frame - hexdump(len=26): c0 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 c0 c6 02 00
Deauthentication notification
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
Added BSSID 06:26:5a:be:a9:b8 into blacklist
CTRL-EVENT-DISCONNECTED bssid=06:26:5a:be:a9:b8 reason=2
Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=5 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x4781bc key_idx=0 set_tx=0 seq_len=0 key_len=0
   addr=06:26:5a:be:a9:b8
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: Event message available
nl80211: Ignore disconnect event when using userspace SME
State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
Include wildcard SSID in the scan request
Starting AP scan for specific SSID(s)
nl80211: Scan SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Scan trigger
nl80211: Event message available
nl80211: New scan results available
Received scan results (3 BSSes)
BSS: Start scan result update 8
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 06:26:5a:be:a9:b8 ssid='UniversWDS' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-53
   selected based on RSN IE
   selected WPA AP 06:26:5a:be:a9:b8 ssid='UniversWDS'
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
Cancelling scan request
Trying to authenticate with 06:26:5a:be:a9:b8 (SSID='UniversWDS' freq=2452 MHz)
No keys have been configured - skip key clearing
State: SCANNING -> AUTHENTICATING
nl80211: Authenticate (ifindex=6)
  * bssid=06:26:5a:be:a9:b8
  * freq=2452
  * SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
  * IEs - hexdump(len=0): [NULL]
  * Auth Type 0
nl80211: Authentication request send successfully
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: Event message available
nl80211: MLME event 37
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 00 ca 00 00 02 00 00 00
SME: Authentication response: peer=06:26:5a:be:a9:b8 auth_type=0 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
Trying to associate with 06:26:5a:be:a9:b8 (SSID='UniversWDS' freq=2452 MHz)
State: AUTHENTICATING -> ASSOCIATING
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Associate (ifindex=6)
  * bssid=06:26:5a:be:a9:b8
  * freq=2452
  * SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
  * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  * prev_bssid=06:26:5a:be:a9:b8
nl80211: Association request send successfully
nl80211: Event message available
nl80211: Ignored unknown event (cmd=19)
nl80211: Event message available
nl80211: MLME event 38
nl80211: MLME event frame - hexdump(len=124): 30 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 20 ca 11 04 00 00 01 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 09 07 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Association info event
resp_ies - hexdump(len=94): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 09 07 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
freq=2452 MHz
State: ASSOCIATING -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=06:26:5a:be:a9:b8
No keys have been configured - skip key clearing
Associated with 06:26:5a:be:a9:b8
WPA: Association event - clear replay counter
WPA: Clear old PTK
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
nl80211: Event message available
nl80211: Ignore connect event (cmd=46) when using userspace SME
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1d
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): af 6b 05 fd 58 a5 33 9e 31 1e ee 87 d3 72 b0 88 a0 4d fc b3 f0 b9 cd b3 0b 93 67 c4 70 b5 c3 40
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 af 6b 05 fd 58 a5 33 9e 31 1e ee 87 d3 72 b0 88 a0 4d fc b3 f0 b9 cd b3 0b 93 67 c4 70 b5 c3 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d5 4a 41 f3 bf dd 03 5a f1 b3 67 bc c0 4f e9 39 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1d
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 af 6b 05 fd 58 a5 33 9e 31 1e ee 87 d3 72 b0 88 a0 4d fc b3 f0 b9 cd b3 0b 93 67 c4 70 b5 c3 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6f b9 6e bd 3c d1 01 1e f9 a4 0b f2 c3 79 4d dc 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1d
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 af 6b 05 fd 58 a5 33 9e 31 1e ee 87 d3 72 b0 88 a0 4d fc b3 f0 b9 cd b3 0b 93 67 c4 70 b5 c3 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 7c 16 1c 67 c3 04 e7 98 c6 08 0e 1d df 66 ca 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Event message available
nl80211: MLME event 39
nl80211: MLME event frame - hexdump(len=26): c0 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 d0 ce 02 00
Deauthentication notification
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
BSSID 06:26:5a:be:a9:b8 blacklist count incremented to 2
CTRL-EVENT-DISCONNECTED bssid=06:26:5a:be:a9:b8 reason=2
Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=5 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x4781bc key_idx=0 set_tx=0 seq_len=0 key_len=0
   addr=06:26:5a:be:a9:b8
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: Event message available
nl80211: Ignore disconnect event when using userspace SME
State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
Include wildcard SSID in the scan request
Starting AP scan for specific SSID(s)
nl80211: Scan SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Scan trigger
nl80211: Event message available
nl80211: New scan results available
Received scan results (3 BSSes)
BSS: Start scan result update 9
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 06:26:5a:be:a9:b8 ssid='UniversWDS' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-53
   skip - blacklisted
1: 00:26:5a:be:a9:b8 ssid='Univers' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-54
   skip - SSID mismatch
2: 00:1c:10:ac:b2:d2 ssid='FamilleOdette' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-90
   skip - SSID mismatch
Try to find non-WPA AP
0: 06:26:5a:be:a9:b8 ssid='UniversWDS' wpa_ie_len=0 rsn_ie_len=20 caps=0x411
   skip - blacklisted
1: 00:26:5a:be:a9:b8 ssid='Univers' wpa_ie_len=0 rsn_ie_len=20 caps=0x411
   skip - SSID mismatch
2: 00:1c:10:ac:b2:d2 ssid='FamilleOdette' wpa_ie_len=24 rsn_ie_len=0 caps=0x411
   skip - SSID mismatch
No APs found - clear blacklist and try again
Removed BSSID 06:26:5a:be:a9:b8 from blacklist (clear)
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 06:26:5a:be:a9:b8 ssid='UniversWDS' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-53
   selected based on RSN IE
   selected WPA AP 06:26:5a:be:a9:b8 ssid='UniversWDS'
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
Cancelling scan request
Trying to authenticate with 06:26:5a:be:a9:b8 (SSID='UniversWDS' freq=2452 MHz)
No keys have been configured - skip key clearing
State: SCANNING -> AUTHENTICATING
nl80211: Authenticate (ifindex=6)
  * bssid=06:26:5a:be:a9:b8
  * freq=2452
  * SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
  * IEs - hexdump(len=0): [NULL]
  * Auth Type 0
nl80211: Authentication request send successfully
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: Event message available
nl80211: MLME event 37
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 d0 d1 00 00 02 00 00 00
SME: Authentication response: peer=06:26:5a:be:a9:b8 auth_type=0 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
Trying to associate with 06:26:5a:be:a9:b8 (SSID='UniversWDS' freq=2452 MHz)
State: AUTHENTICATING -> ASSOCIATING
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Associate (ifindex=6)
  * bssid=06:26:5a:be:a9:b8
  * freq=2452
  * SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
  * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  * prev_bssid=06:26:5a:be:a9:b8
nl80211: Association request send successfully
nl80211: Event message available
nl80211: Ignored unknown event (cmd=19)
nl80211: Event message available
nl80211: MLME event 38
nl80211: MLME event frame - hexdump(len=124): 30 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 f0 d1 11 04 00 00 01 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 09 07 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Association info event
resp_ies - hexdump(len=94): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 09 07 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
freq=2452 MHz
State: ASSOCIATING -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=06:26:5a:be:a9:b8
No keys have been configured - skip key clearing
Associated with 06:26:5a:be:a9:b8
WPA: Association event - clear replay counter
WPA: Clear old PTK
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
nl80211: Event message available
nl80211: Ignore connect event (cmd=46) when using userspace SME
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1e
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 19 33 a4 8b 76 2f f7 59 5a eb 17 3b 13 e3 0c 0d 19 4a b0 cb b7 7b 1d d4 de 7b 42 fe 15 0e c3 85
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 19 33 a4 8b 76 2f f7 59 5a eb 17 3b 13 e3 0c 0d 19 4a b0 cb b7 7b 1d d4 de 7b 42 fe 15 0e c3 85 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ea dc d9 01 cd 6a ee a1 c9 48 bc ab 38 c2 fa 3a 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1e
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 19 33 a4 8b 76 2f f7 59 5a eb 17 3b 13 e3 0c 0d 19 4a b0 cb b7 7b 1d d4 de 7b 42 fe 15 0e c3 85 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 94 7a 8a ae f7 0e 80 34 eb 9f 4f d7 7f dd 2d 41 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1e
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 19 33 a4 8b 76 2f f7 59 5a eb 17 3b 13 e3 0c 0d 19 4a b0 cb b7 7b 1d d4 de 7b 42 fe 15 0e c3 85 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 5e a2 ab af b5 77 49 df fa 3e ff 61 79 b0 d0 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Event message available
nl80211: MLME event 39
nl80211: MLME event frame - hexdump(len=26): c0 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 c0 d6 02 00
Deauthentication notification
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
Added BSSID 06:26:5a:be:a9:b8 into blacklist
CTRL-EVENT-DISCONNECTED bssid=06:26:5a:be:a9:b8 reason=2
Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x458e24 key_idx=5 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x4781bc key_idx=0 set_tx=0 seq_len=0 key_len=0
   addr=06:26:5a:be:a9:b8
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: Event message available
nl80211: Ignore disconnect event when using userspace SME
State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
Include wildcard SSID in the scan request
Starting AP scan for specific SSID(s)
nl80211: Scan SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Scan trigger
nl80211: Event message available
nl80211: New scan results available
Received scan results (3 BSSes)
BSS: Start scan result update 10
New scan results available
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 06:26:5a:be:a9:b8 ssid='UniversWDS' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48
   selected based on RSN IE
   selected WPA AP 06:26:5a:be:a9:b8 ssid='UniversWDS'
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
Cancelling scan request
Trying to authenticate with 06:26:5a:be:a9:b8 (SSID='UniversWDS' freq=2452 MHz)
No keys have been configured - skip key clearing
State: SCANNING -> AUTHENTICATING
nl80211: Authenticate (ifindex=6)
  * bssid=06:26:5a:be:a9:b8
  * freq=2452
  * SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
  * IEs - hexdump(len=0): [NULL]
  * Auth Type 0
nl80211: Authentication request send successfully
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: Event message available
nl80211: MLME event 37
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 40 da 00 00 02 00 00 00
SME: Authentication response: peer=06:26:5a:be:a9:b8 auth_type=0 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
Trying to associate with 06:26:5a:be:a9:b8 (SSID='UniversWDS' freq=2452 MHz)
State: AUTHENTICATING -> ASSOCIATING
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Associate (ifindex=6)
  * bssid=06:26:5a:be:a9:b8
  * freq=2452
  * SSID - hexdump_ascii(len=10):
     55 6e 69 76 65 72 73 57 44 53                     UniversWDS      
  * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  * prev_bssid=06:26:5a:be:a9:b8
nl80211: Association request send successfully
nl80211: Event message available
nl80211: Ignored unknown event (cmd=19)
nl80211: Event message available
nl80211: MLME event 38
nl80211: MLME event frame - hexdump(len=124): 30 00 3a 01 00 23 cd 17 26 92 06 26 5a be a9 b8 06 26 5a be a9 b8 60 da 11 04 00 00 01 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 09 07 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Association info event
resp_ies - hexdump(len=94): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 09 07 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
freq=2452 MHz
State: ASSOCIATING -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=06:26:5a:be:a9:b8
No keys have been configured - skip key clearing
Associated with 06:26:5a:be:a9:b8
WPA: Association event - clear replay counter
WPA: Clear old PTK
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
nl80211: Event message available
nl80211: Ignore connect event (cmd=46) when using userspace SME
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 06:26:5a:be:a9:b8
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1f
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 f4 b0 b0 6a d8 cc d3 91 c7 95 bc d5 0d 73 0c 2d 0d 9d fd 47 a7 2d 65 ae fb 6a 84 59 ce 4f 3b 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 06:26:5a:be:a9:b8 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): c5 39 12 9c 6e 56 7d dc ff b9 99 91 26 3b d8 37 f4 07 07 82 50 f8 05 5e 76 49 24 3d a7 0e c0 68
WPA: PTK derivation - A1=00:23:cd:17:26:92 A2=06:26:5a:be:a9:b8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 c5 39 12 9c 6e 56 7d dc ff b9 99 91 26 3b d8 37 f4 07 07 82 50 f8 05 5e 76 49 24 3d a7 0e c0 68 00 00 00 00 0

comment:14 Changed 7 years ago by nbd

Can't reproduce these issues with recent versions. Please test it again

comment:15 Changed 7 years ago by nbd

  • Resolution set to worksforme
  • Status changed from reopened to closed

comment:16 Changed 4 years ago by jow

  • Milestone changed from Attitude Adjustment 12.09 to Barrier Breaker 14.07

Milestone Attitude Adjustment 12.09 deleted

Add Comment

Modify Ticket

Action
as closed .
The resolution will be deleted. Next status will be 'reopened'.
Author


E-mail address and user name can be saved in the Preferences.

 
Note: See TracTickets for help on using tickets.