I'm seeing this problem too on kernel with WPA2 security (no enterprise): Linux version 2.6.31-20-generic My network card is: Network controller: Intel Corporation PRO/Wireless 5300 AGN [Shiloh] Network Connection My wpa_supplicant.conf: ctrl_interface=/var/run/wpa_supplicant eapol_version=1 ap_scan=2 network={ ssid="WLAN-1AFE02" psk= scan_ssid=1 proto=RSN key_mgmt=WPA-PSK pairwise=CCMP group=TKIP } From dmesg: [ 4539.906494] wlan0: associate with AP 00:1a:2a:1a:fe:0c (try 1) [ 4539.923039] wlan0: RX AssocResp from 00:1a:2a:1a:fe:0c (capab=0x431 status=0 aid=1) [ 4539.923042] wlan0: associated [ 4545.020065] wlan0: deauthenticating from 00:1a:2a:1a:fe:0c by local choice (reason=17) [ 4545.020140] wlan0: deauthenticating from 00:1a:2a:1a:fe:0c by local choice (reason=3) [ 4545.060811] wlan0: deauthenticating from 00:1a:2a:1a:fe:0c by local choice (reason=3) [ 4545.061325] wlan0: direct probe to AP 00:1a:2a:1a:fe:0c (try 1) [ 4545.075888] wlan0: direct probe responded [ 4545.075892] wlan0: authenticate with AP 00:1a:2a:1a:fe:0c (try 1) [ 4545.082269] wlan0: authenticated [ 4545.082286] wlan0: associate with AP 00:1a:2a:1a:fe:0c (try 1) [ 4545.096930] wlan0: RX AssocResp from 00:1a:2a:1a:fe:0c (capab=0x431 status=0 aid=1) [ 4545.096939] wlan0: associated [ 4550.200338] wlan0: deauthenticating from 00:1a:2a:1a:fe:0c by local choice (reason=17) [ 4550.200388] wlan0: deauthenticating from 00:1a:2a:1a:fe:0c by local choice (reason=3) [ 4550.201765] wlan0: deauthenticating from 00:1a:2a:1a:fe:0c by local choice (reason=3) [ 4550.201887] wlan0: direct probe to AP 00:1a:2a:1a:fe:0c (try 1) [ 4550.216873] wlan0: direct probe responded [ 4550.216884] wlan0: authenticate with AP 00:1a:2a:1a:fe:0c (try 1) [ 4550.236229] wlan0: authenticated [ 4550.241409] wlan0: associate with AP 00:1a:2a:1a:fe:0c (try 1) [ 4550.259146] wlan0: RX AssocResp from 00:1a:2a:1a:fe:0c (capab=0x431 status=0 aid=1) [ 4550.259151] wlan0: associated [ 4555.360113] wlan0: deauthenticating from 00:1a:2a:1a:fe:0c by local choice (reason=17) [ 4555.360183] wlan0: deauthenticating from 00:1a:2a:1a:fe:0c by local choice (reason=3) [ 4555.361653] wlan0: deauthenticating from 00:1a:2a:1a:fe:0c by local choice (reason=3) [ 4555.361866] wlan0: direct probe to AP 00:1a:2a:1a:fe:0c (try 1) [ 4555.376961] wlan0: direct probe responded [ 4555.376969] wlan0: authenticate with AP 00:1a:2a:1a:fe:0c (try 1) [ 4555.396347] wlan0: authenticated [ 4555.398140] wlan0: associate with AP 00:1a:2a:1a:fe:0c (try 1) [ 4555.419279] wlan0: RX AssocResp from 00:1a:2a:1a:fe:0c (capab=0x431 status=0 aid=1) [ 4555.419282] wlan0: associated [ 4560.520087] wlan0: deauthenticating from 00:1a:2a:1a:fe:0c by local choice (reason=17) [ 4560.520148] wlan0: deauthenticating from 00:1a:2a:1a:fe:0c by local choice (reason=3) [ 4560.560727] wlan0: deauthenticating from 00:1a:2a:1a:fe:0c by local choice (reason=3) [ 4560.560879] wlan0: direct probe to AP 00:1a:2a:1a:fe:0c (try 1) [ 4560.572550] wlan0: direct probe responded [ 4560.572553] wlan0: authenticate with AP 00:1a:2a:1a:fe:0c (try 1) [ 4560.582378] wlan0: authenticated [ 4560.582407] wlan0: associate with AP 00:1a:2a:1a:fe:0c (try 1) [ 4560.597169] wlan0: RX AssocResp from 00:1a:2a:1a:fe:0c (capab=0x431 status=0 aid=1) [ 4560.597173] wlan0: associated [ 4565.690066] wlan0: deauthenticating from 00:1a:2a:1a:fe:0c by local choice (reason=17) [ 4565.690120] wlan0: deauthenticating from 00:1a:2a:1a:fe:0c by local choice (reason=3) [ 4565.722342] wlan0: deauthenticating from 00:1a:2a:1a:fe:0c by local choice (reason=3) [ 4565.722452] wlan0: direct probe to AP 00:1a:2a:1a:fe:0c (try 1) [ 4565.727757] wlan0: direct probe responded [ 4565.727761] wlan0: authenticate with AP 00:1a:2a:1a:fe:0c (try 1) [ 4565.736407] wlan0: authenticated [ 4565.736450] wlan0: associate with AP 00:1a:2a:1a:fe:0c (try 1) [ 4565.750471] wlan0: RX AssocResp from 00:1a:2a:1a:fe:0c (capab=0x431 status=0 aid=1) [ 4565.750474] wlan0: associated [ 4569.452569] wlan0: deauthenticating from 00:1a:2a:1a:fe:0c by local choice (reason=3) [ 4569.452637] wlan0: deauthenticating from 00:1a:2a:1a:fe:0c by local choice (reason=3) some wpa_supplicant output root@zbenjamin-laptop:/home/zbenjamin/.kde/share/apps/networkmanagement/connections# wpa_supplicant -Dwext -iwlan0 -c /etc/wpa_supplicant/wpa_supplicant.conf -d Initializing interface 'wlan0' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf' Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' ctrl_interface='/var/run/wpa_supplicant' eapol_version=1 ap_scan=1 Priority group 0 id=0 ssid='WLAN-1AFE02' Interface wlan0 set UP - waiting a second for the driver to complete initialization SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf capabilities: key_mgmt 0xf enc 0xf flags 0x0 WEXT: Operstate: linkmode=1, operstate=5 Own MAC address: 00:16:ea:c3:99:02 wpa_driver_wext_set_wpa wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_countermeasures wpa_driver_wext_set_drop_unencrypted RSN: flushing PMKID list in the driver Setting scan request: 0 sec 100000 usec WPS: UUID based on MAC address - hexdump(len=16): d9 f6 a1 d6 f1 e7 5d 16 a3 e0 ef c8 2e f9 e5 81 WPS: Build Beacon and Probe Response IEs WPS: * Version WPS: * Wi-Fi Protected Setup State (0) WPS: * Version WPS: * Wi-Fi Protected Setup State (0) WPS: * Response Type (2) WPS: * UUID-E WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Serial Number WPS: * Primary Device Type WPS: * Device Name WPS: * Config Methods (0) WPS: * RF Bands (3) EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED Added interface wlan0 RTM_NEWLINK: operstate=0 ifi_flags=0x1002 () RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=16 Received 442 bytes of scan results (1 BSSes) CTRL-EVENT-SCAN-RESULTS Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:1a:2a:1a:fe:0c ssid='WLAN-1AFE02' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP 00:1a:2a:1a:fe:0c ssid='WLAN-1AFE02' Trying to associate with 00:1a:2a:1a:fe:0c (SSID='WLAN-1AFE02' freq=2412 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: DISCONNECTED -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=58 AssocResp IE wireless event - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 03 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 00:1a:2a:1a:fe:0c Association info event resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 03 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:1a:2a:1a:fe:0c No keys have been configured - skip key clearing Associated with 00:1a:2a:1a:fe:0c WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RX EAPOL from 00:1a:2a:1a:fe:0c Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=117 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 02 3c key_nonce - hexdump(len=32): 8b e8 52 fe a9 ea d9 64 09 bb a8 43 58 77 a6 be 67 dd ef d8 c4 88 36 79 0e 51 39 a8 d6 88 e4 12 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:1a:2a:1a:fe:0c (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 97 19 f3 7d a3 aa a3 85 db 3b a2 0b 0b c1 16 f7 RSN: PMKID from Authenticator - hexdump(len=16): 97 19 f3 7d a3 aa a3 85 db 3b a2 0b 0b c1 16 f7 RSN: no matching PMKID found WPA: Renewed SNonce - hexdump(len=32): 41 4a c1 86 03 6e bc 2b c3 04 c9 af 0e 01 4a 7d 40 50 b3 b0 51 44 27 43 a9 91 1c 3f a3 05 25 a2 WPA: PTK derivation - A1=00:16:ea:c3:99:02 A2=00:1a:2a:1a:fe:0c WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 RX EAPOL from 00:1a:2a:1a:fe:0c IEEE 802.1X RX: version=1 type=3 length=167 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=72 replay_counter - hexdump(len=8): 00 00 00 00 00 00 02 3d key_nonce - hexdump(len=32): 8b e8 52 fe a9 ea d9 64 09 bb a8 43 58 77 a6 be 67 dd ef d8 c4 88 36 79 0e 51 39 a8 d6 88 e4 12 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): f2 72 60 72 ad 48 93 9c 15 9e 72 dd 29 ab 21 39 RSN: encrypted key data - hexdump(len=72): 8b f9 21 d9 5c 06 8c c6 55 a0 8d e6 4b d7 2d 13 0a a2 c0 3a 1d 2b 76 1a 6f 7e 06 fe 3b 47 47 15 1e c2 50 ff f8 7c 73 54 68 58 a9 e0 ad 8e 2a 21 c5 94 66 d8 ef 96 39 e6 6e 9a dc b6 85 90 e7 d6 d1 e4 1d 81 da 83 f9 44 WPA: decrypted EAPOL-Key key data - hexdump(len=64): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:1a:2a:1a:fe:0c (ver=2) WPA: IE KeyData - hexdump(len=64): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 02 00 62 af 63 f2 6d d7 f0 98 6a 00 72 0b 21 12 f3 cc 46 ea 2c ea 3d e5 20 50 17 6f 58 15 83 0b 93 91 dd 00 WPA: IE in 3/4 msg does not match with IE in Beacon/ProbeResp (src=00:1a:2a:1a:fe:0c) WPA: WPA IE in Beacon/ProbeResp - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02 WPA: RSN IE in Beacon/ProbeResp - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: RSN IE in 3/4 msg - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 wpa_driver_wext_disassociate No keys have been configured - skip key clearing State: 4WAY_HANDSHAKE -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan (specific SSID) Scan SSID - hexdump_ascii(len=11): 57 4c 41 4e 2d 31 41 46 45 30 32 WLAN-1AFE02 Trying to get current scan results first without requesting a new scan to speed up initial association ioctl[SIOCGIWSCAN]: Resource temporarily unavailable Failed to get scan results Failed to get scan results - try scanning again Setting scan request: 0 sec 0 usec RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 00:00:00:00:00:00 Added BSSID 00:00:00:00:00:00 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: SCANNING -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) ioctl[SIOCSIWSCAN]: Device or resource busy Scan requested (ret=-1) - scan timeout 30 seconds Failed to initiate AP scan. Setting scan request: 10 sec 0 usec RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=16 Received 441 bytes of scan results (1 BSSes) CTRL-EVENT-SCAN-RESULTS Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:1a:2a:1a:fe:0c ssid='WLAN-1AFE02' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP 00:1a:2a:1a:fe:0c ssid='WLAN-1AFE02' Trying to associate with 00:1a:2a:1a:fe:0c (SSID='WLAN-1AFE02' freq=2412 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=16 Received 441 bytes of scan results (1 BSSes) CTRL-EVENT-SCAN-RESULTS Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:1a:2a:1a:fe:0c ssid='WLAN-1AFE02' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP 00:1a:2a:1a:fe:0c ssid='WLAN-1AFE02' Already associated with the selected AP. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=58 AssocResp IE wireless event - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 03 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 00:1a:2a:1a:fe:0c Association info event resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 03 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:1a:2a:1a:fe:0c No keys have been configured - skip key clearing Associated with 00:1a:2a:1a:fe:0c WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RX EAPOL from 00:1a:2a:1a:fe:0c Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=117 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 02 3e key_nonce - hexdump(len=32): 8b e8 52 fe a9 ea d9 64 09 bb a8 43 58 77 a6 be 67 dd ef d8 c4 88 36 79 0e 51 39 a8 d6 88 e4 13 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:1a:2a:1a:fe:0c (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 97 19 f3 7d a3 aa a3 85 db 3b a2 0b 0b c1 16 f7 RSN: PMKID from Authenticator - hexdump(len=16): 97 19 f3 7d a3 aa a3 85 db 3b a2 0b 0b c1 16 f7 RSN: no matching PMKID found WPA: Renewed SNonce - hexdump(len=32): 7f 37 d6 02 06 c1 92 5d 2c 0a c3 61 95 c0 00 de 50 39 a6 90 5e 62 7f e3 0b bd 45 e5 34 be c9 05 WPA: PTK derivation - A1=00:16:ea:c3:99:02 A2=00:1a:2a:1a:fe:0c WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 RX EAPOL from 00:1a:2a:1a:fe:0c IEEE 802.1X RX: version=1 type=3 length=167 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=72 replay_counter - hexdump(len=8): 00 00 00 00 00 00 02 3f key_nonce - hexdump(len=32): 8b e8 52 fe a9 ea d9 64 09 bb a8 43 58 77 a6 be 67 dd ef d8 c4 88 36 79 0e 51 39 a8 d6 88 e4 13 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 26 4e 99 9f 7e a0 e8 56 9e 84 97 b5 a5 ac fa fd RSN: encrypted key data - hexdump(len=72): 8b 73 30 94 d4 9b c9 c0 7c 86 c5 1a 4c 0c c3 c0 99 31 f7 ef 6f c2 fc cb eb 7f 13 2f d2 96 d3 9e 8c e6 2d 55 44 5e 29 78 46 e4 70 1e 6d 88 e0 13 ba a8 68 f5 39 70 19 fc 63 eb 9a 1f 38 39 86 95 59 99 64 8f ed 45 28 5a WPA: decrypted EAPOL-Key key data - hexdump(len=64): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:1a:2a:1a:fe:0c (ver=2) WPA: IE KeyData - hexdump(len=64): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 02 00 62 af 63 f2 6d d7 f0 98 6a 00 72 0b 21 12 f3 cc 46 ea 2c ea 3d e5 20 50 17 6f 58 15 83 0b 93 91 dd 00 WPA: IE in 3/4 msg does not match with IE in Beacon/ProbeResp (src=00:1a:2a:1a:fe:0c) WPA: WPA IE in Beacon/ProbeResp - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02 WPA: RSN IE in Beacon/ProbeResp - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: RSN IE in 3/4 msg - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 wpa_driver_wext_disassociate No keys have been configured - skip key clearing State: 4WAY_HANDSHAKE -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan (specific SSID) Scan SSID - hexdump_ascii(len=11): 57 4c 41 4e 2d 31 41 46 45 30 32 WLAN-1AFE02 ioctl[SIOCSIWSCAN]: Device or resource busy Scan requested (ret=-1) - scan timeout 30 seconds Failed to initiate AP scan. Setting scan request: 10 sec 0 usec RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 00:00:00:00:00:00 BSSID 00:00:00:00:00:00 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: SCANNING -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=16 Received 441 bytes of scan results (1 BSSes) CTRL-EVENT-SCAN-RESULTS Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:1a:2a:1a:fe:0c ssid='WLAN-1AFE02' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP 00:1a:2a:1a:fe:0c ssid='WLAN-1AFE02' Trying to associate with 00:1a:2a:1a:fe:0c (SSID='WLAN-1AFE02' freq=2412 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: DISCONNECTED -> ASSOCIATING