==> comments <== modprobe ath5k ==> /var/log/syslog <== Sep 30 22:10:23 t40p kernel: [ 2545.404305] ath5k_pci 0000:02:02.0: PCI INT A -> Link[LNKC] -> GSI 11 (level, low) -> IRQ 11 Sep 30 22:10:23 t40p kernel: [ 2545.405667] ath5k_pci 0000:02:02.0: registered as 'phy0' Sep 30 22:10:23 t40p kernel: [ 2545.438923] phy0: Selected rate control algorithm 'pid' Sep 30 22:10:23 t40p kernel: [ 2545.440725] Registered led device: ath5k-phy0::rx Sep 30 22:10:23 t40p kernel: [ 2545.441495] Registered led device: ath5k-phy0::tx Sep 30 22:10:23 t40p kernel: [ 2545.441503] ath5k phy0: Atheros AR5211 chip found (MAC: 0x42, PHY: 0x30) Sep 30 22:10:23 t40p kernel: [ 2545.441506] ath5k phy0: RF5111 5GHz radio found (0x17) Sep 30 22:10:23 t40p kernel: [ 2545.441509] ath5k phy0: RF2111 2GHz radio found (0x23) Sep 30 22:10:23 t40p kernel: [ 2545.451354] udev: renamed network interface wlan0 to ath0 Sep 30 22:10:23 t40p NetworkManager: ath0: driver is 'ath5k_pci'. Sep 30 22:10:23 t40p NetworkManager: ath0: driver supports SSID scans (scan_capa 0x01). Sep 30 22:10:23 t40p NetworkManager: Found new 802.11 WiFi device 'ath0'. Sep 30 22:10:23 t40p NetworkManager: (ath0): exported as /org/freedesktop/Hal/devices/net_00_05_4e_40_93_b3_0 Sep 30 22:10:27 t40p NetworkManager: (ath0): device state change: 1 -> 2 Sep 30 22:10:27 t40p NetworkManager: (ath0): bringing up device. Sep 30 22:10:27 t40p kernel: [ 2549.551677] ADDRCONF(NETDEV_UP): ath0: link is not ready Sep 30 22:10:27 t40p NetworkManager: (ath0): preparing device. Sep 30 22:10:27 t40p NetworkManager: (ath0): deactivating device. Sep 30 22:10:27 t40p NetworkManager: (ath0): device state change: 2 -> 3 Sep 30 22:10:27 t40p NetworkManager: (ath0): supplicant interface state change: 1 -> 2. ==> /var/log/wpa_supplicant.log <== Initializing interface 'ath0' conf 'N/A' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' Initializing interface (2) 'ath0' SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf capabilities: key_mgmt 0xf enc 0xf flags 0x0 WEXT: Operstate: linkmode=1, operstate=5 Own MAC address: 00:05:4e:40:93:b3 wpa_driver_wext_set_wpa wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_countermeasures wpa_driver_wext_set_drop_unencrypted RSN: flushing PMKID list in the driver Setting scan request: 1 sec 100000 usec EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED Added interface ath0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b06 len=8 Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Trying to get current scan results first without requesting a new scan to speed up initial association Failed to get scan results Failed to get scan results - try scanning again Setting scan request: 0 sec 0 usec No enabled networks - do not scan State: SCANNING -> INACTIVE Setting scan request: 0 sec 0 usec State: INACTIVE -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 5 seconds EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b19 len=8 Received 279 bytes of scan results (1 BSSes) CTRL-EVENT-SCAN-RESULTS No suitable AP found. Setting scan request: 5 sec 0 usec No enabled networks - do not scan State: SCANNING -> INACTIVE Setting scan request: 0 sec 0 usec State: INACTIVE -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b19 len=8 Received 279 bytes of scan results (1 BSSes) CTRL-EVENT-SCAN-RESULTS No suitable AP found. Setting scan request: 5 sec 0 usec No enabled networks - do not scan State: SCANNING -> INACTIVE Setting scan request: 0 sec 0 usec State: INACTIVE -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b19 len=8 Received 279 bytes of scan results (1 BSSes) CTRL-EVENT-SCAN-RESULTS No suitable AP found. Setting scan request: 5 sec 0 usec No enabled networks - do not scan State: SCANNING -> INACTIVE ==> comments <== click on network essid in nm-applet ==> /var/log/syslog <== Sep 30 22:11:32 t40p NetworkManager: Activation (ath0) starting connection 'mxtelecom' Sep 30 22:11:32 t40p NetworkManager: (ath0): device state change: 3 -> 4 Sep 30 22:11:32 t40p NetworkManager: Activation (ath0) Stage 1 of 5 (Device Prepare) scheduled... Sep 30 22:11:32 t40p NetworkManager: Activation (ath0) Stage 1 of 5 (Device Prepare) started... Sep 30 22:11:32 t40p NetworkManager: Activation (ath0) Stage 2 of 5 (Device Configure) scheduled... Sep 30 22:11:32 t40p NetworkManager: Activation (ath0) Stage 1 of 5 (Device Prepare) complete. Sep 30 22:11:32 t40p NetworkManager: Activation (ath0) Stage 2 of 5 (Device Configure) starting... Sep 30 22:11:32 t40p NetworkManager: (ath0): device state change: 4 -> 5 Sep 30 22:11:32 t40p NetworkManager: Activation (ath0/wireless): connection 'mxtelecom' has security, and secrets exist. No new secrets needed. Sep 30 22:11:32 t40p NetworkManager: Config: added 'ssid' value 'mxtelecom' Sep 30 22:11:32 t40p NetworkManager: Config: added 'scan_ssid' value '1' Sep 30 22:11:32 t40p NetworkManager: Config: added 'key_mgmt' value 'WPA-PSK' Sep 30 22:11:32 t40p NetworkManager: Config: added 'psk' value '' Sep 30 22:11:32 t40p NetworkManager: Config: added 'proto' value 'WPA RSN' Sep 30 22:11:32 t40p NetworkManager: Config: added 'pairwise' value 'TKIP CCMP' Sep 30 22:11:32 t40p NetworkManager: Config: added 'group' value 'WEP40 WEP104 TKIP CCMP' Sep 30 22:11:32 t40p NetworkManager: Activation (ath0) Stage 2 of 5 (Device Configure) complete. Sep 30 22:11:32 t40p NetworkManager: Config: set interface ap_scan to 1 Sep 30 22:11:32 t40p NetworkManager: (ath0): supplicant connection state change: 1 -> 2 ==> /var/log/wpa_supplicant.log <== pairwise: 0x18 ssid - hexdump_ascii(len=9): 6d 78 74 65 6c 65 63 6f 6d mxtelecom group: 0x1e proto: 0x3 key_mgmt: 0x2 PSK - hexdump(len=32): [REMOVED] scan_ssid=1 (0x1) Setting scan request: 0 sec 0 usec State: INACTIVE -> SCANNING Starting AP scan (specific SSID) Scan SSID - hexdump_ascii(len=9): 6d 78 74 65 6c 65 63 6f 6d mxtelecom Scan requested (ret=0) - scan timeout 30 seconds ==> /var/log/syslog <== Sep 30 22:11:36 t40p NetworkManager: (ath0): supplicant connection state change: 2 -> 3 Sep 30 22:11:36 t40p kernel: [ 2618.954658] ath0: authenticate with AP 00:16:b6:da:6f:f2 Sep 30 22:11:36 t40p kernel: [ 2618.956160] ath0: authenticated Sep 30 22:11:36 t40p kernel: [ 2618.956168] ath0: associate with AP 00:16:b6:da:6f:f2 Sep 30 22:11:36 t40p kernel: [ 2618.958471] ath0: RX AssocResp from 00:16:b6:da:6f:f2 (capab=0x411 status=0 aid=1) Sep 30 22:11:36 t40p kernel: [ 2618.958478] ath0: associated Sep 30 22:11:36 t40p kernel: [ 2618.958866] ADDRCONF(NETDEV_CHANGE): ath0: link becomes ready ==> /var/log/wpa_supplicant.log <== RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b19 len=8 Received 279 bytes of scan results (1 BSSes) CTRL-EVENT-SCAN-RESULTS Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:16:b6:da:6f:f2 ssid='mxtelecom' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 selected based on WPA IE selected WPA AP 00:16:b6:da:6f:f2 ssid='mxtelecom' Try to find non-WPA AP Trying to associate with 00:16:b6:da:6f:f2 (SSID='mxtelecom' freq=2427 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 WPA: using IEEE 802.11i/D3.0 WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1 WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK TKIP WPA: using KEY_MGMT WPA-PSK WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8c02 len=165 WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00096d7874656c65636f6d010402040b16dd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020104)' Association info event req_ies - hexdump(len=41): 00 09 6d 78 74 65 6c 65 63 6f 6d 01 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 01 04 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:16:b6:da:6f:f2 State: ASSOCIATING -> ASSOCIATED ==> /var/log/syslog <== Sep 30 22:11:36 t40p NetworkManager: (ath0): supplicant connection state change: 3 -> 4 Sep 30 22:11:36 t40p NetworkManager: (ath0): supplicant connection state change: 4 -> 5 Sep 30 22:11:36 t40p NetworkManager: (ath0): supplicant connection state change: 5 -> 6 ==> /var/log/wpa_supplicant.log <== wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:16:b6:da:6f:f2 No keys have been configured - skip key clearing Associated with 00:16:b6:da:6f:f2 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added RX EAPOL from 00:16:b6:da:6f:f2 RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 bb 1a 90 d9 a1 4a 68 5f a2 af 45 cc 05 da ca bc 3a 68 41 f7 2b 38 7a 99 0a c9 c2 a6 f5 06 10 ea 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): bb 1a 90 d9 a1 4a 68 5f a2 af 45 cc 05 da ca bc 3a 68 41 f7 2b 38 7a 99 0a c9 c2 a6 f5 06 10 ea key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 bb 1a 90 d9 a1 4a 68 5f a2 af 45 cc 05 da ca bc 3a 68 41 f7 2b 38 7a 99 0a c9 c2 a6 f5 06 10 ea 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:16:b6:da:6f:f2 (ver=1) WPA: Renewed SNonce - hexdump(len=32): de 8e 95 05 6c 05 a7 9c 4e db e1 10 e4 4b 2d 02 59 a9 e6 d4 a1 b2 26 d8 f8 1a c9 26 c4 34 0c c1 WPA: PTK derivation - A1=00:05:4e:40:93:b3 A2=00:16:b6:da:6f:f2 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 de 8e 95 05 6c 05 a7 9c 4e db e1 10 e4 4b 2d 02 59 a9 e6 d4 a1 b2 26 d8 f8 1a c9 26 c4 34 0c c1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 24 b2 6f ab 59 68 bc 9b a0 6f 17 a3 db 48 3a 2c 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RX EAPOL from 00:16:b6:da:6f:f2 RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 bb 1a 90 d9 a1 4a 68 5f a2 af 45 cc 05 da ca bc 3a 68 41 f7 2b 38 7a 99 0a c9 c2 a6 f5 06 10 ea 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d9 11 7d 2f 5d f1 13 1e 2a 05 63 64 69 8b 50 c8 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 IEEE 802.1X RX: version=1 type=3 length=121 EAPOL-Key type=254 key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) key_length=32 key_data_length=26 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): bb 1a 90 d9 a1 4a 68 5f a2 af 45 cc 05 da ca bc 3a 68 41 f7 2b 38 7a 99 0a c9 c2 a6 f5 06 10 ea key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): d9 11 7d 2f 5d f1 13 1e 2a 05 63 64 69 8b 50 c8 WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 bb 1a 90 d9 a1 4a 68 5f a2 af 45 cc 05 da ca bc 3a 68 41 f7 2b 38 7a 99 0a c9 c2 a6 f5 06 10 ea 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d9 11 7d 2f 5d f1 13 1e 2a 05 63 64 69 8b 50 c8 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:16:b6:da:6f:f2 (ver=1) WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 94 47 b4 da dc 78 53 60 0d 85 ac e5 27 81 cb 8a 00 00 WPA: Installing PTK to the driver. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE ==> /var/log/syslog <== Sep 30 22:11:38 t40p avahi-daemon[4731]: Registering new address record for fe80::205:4eff:fe40:93b3 on ath0.*. ==> /var/log/wpa_supplicant.log <== EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) ==> /var/log/syslog <== Sep 30 22:11:40 t40p kernel: [ 2622.966801] ath0: deauthenticated Sep 30 22:11:40 t40p NetworkManager: (ath0): supplicant connection state change: 6 -> 0 Sep 30 22:11:40 t40p NetworkManager: (ath0): supplicant connection state change: 0 -> 2 ==> /var/log/wpa_supplicant.log <== RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID 00:16:b6:da:6f:f2 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: GROUP_HANDSHAKE -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds ==> /var/log/syslog <== Sep 30 22:11:41 t40p kernel: [ 2623.964984] ath0: authenticate with AP 00:16:b6:da:6f:f2 Sep 30 22:11:41 t40p kernel: [ 2623.966473] ath0: authenticated Sep 30 22:11:41 t40p kernel: [ 2623.966490] ath0: associate with AP 00:16:b6:da:6f:f2 Sep 30 22:11:41 t40p kernel: [ 2623.968957] ath0: RX ReassocResp from 00:16:b6:da:6f:f2 (capab=0x411 status=0 aid=1) Sep 30 22:11:41 t40p kernel: [ 2623.968972] ath0: associated Sep 30 22:11:41 t40p NetworkManager: (ath0): supplicant connection state change: 2 -> 4 ==> /var/log/wpa_supplicant.log <== RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8c02 len=165 WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00096d7874656c65636f6d010402040b16dd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020104)' Association info event req_ies - hexdump(len=41): 00 09 6d 78 74 65 6c 65 63 6f 6d 01 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 01 04 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:16:b6:da:6f:f2 State: SCANNING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:16:b6:da:6f:f2 No keys have been configured - skip key clearing Associated with 00:16:b6:da:6f:f2 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) ==> /var/log/syslog <== Sep 30 22:11:46 t40p NetworkManager: (ath0): supplicant connection state change: 4 -> 0 Sep 30 22:11:46 t40p kernel: [ 2628.711118] ath0: deauthenticated Sep 30 22:11:46 t40p NetworkManager: (ath0): supplicant connection state change: 0 -> 2 ==> /var/log/wpa_supplicant.log <== RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b19 len=8 Received 279 bytes of scan results (1 BSSes) CTRL-EVENT-SCAN-RESULTS Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:16:b6:da:6f:f2 ssid='mxtelecom' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 selected based on WPA IE selected WPA AP 00:16:b6:da:6f:f2 ssid='mxtelecom' Try to find non-WPA AP Already associated with the selected AP. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec BSSID 00:16:b6:da:6f:f2 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added State: DISCONNECTED -> SCANNING Starting AP scan (specific SSID) Scan SSID - hexdump_ascii(len=9): 6d 78 74 65 6c 65 63 6f 6d mxtelecom Scan requested (ret=0) - scan timeout 30 seconds ==> /var/log/syslog <== Sep 30 22:11:47 t40p kernel: [ 2629.708069] ath0: authenticate with AP 00:16:b6:da:6f:f2 Sep 30 22:11:47 t40p kernel: [ 2629.709595] ath0: authenticated Sep 30 22:11:47 t40p kernel: [ 2629.709612] ath0: associate with AP 00:16:b6:da:6f:f2 Sep 30 22:11:47 t40p NetworkManager: (ath0): supplicant connection state change: 2 -> 4 Sep 30 22:11:47 t40p kernel: [ 2629.712094] ath0: RX ReassocResp from 00:16:b6:da:6f:f2 (capab=0x411 status=0 aid=1) Sep 30 22:11:47 t40p kernel: [ 2629.712109] ath0: associated Sep 30 22:11:47 t40p kernel: [ 2629.916043] ath0: no IPv6 routers present ==> /var/log/wpa_supplicant.log <== RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8c02 len=165 WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00096d7874656c65636f6d010402040b16dd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020104)' Association info event req_ies - hexdump(len=41): 00 09 6d 78 74 65 6c 65 63 6f 6d 01 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 01 04 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:16:b6:da:6f:f2 State: SCANNING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:16:b6:da:6f:f2 No keys have been configured - skip key clearing Associated with 00:16:b6:da:6f:f2 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) ==> /var/log/syslog <== Sep 30 22:11:52 t40p NetworkManager: (ath0): supplicant connection state change: 4 -> 0 Sep 30 22:11:52 t40p kernel: [ 2634.433402] ath0: deauthenticated Sep 30 22:11:52 t40p NetworkManager: (ath0): supplicant connection state change: 0 -> 2 ==> /var/log/wpa_supplicant.log <== RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b19 len=8 Received 279 bytes of scan results (1 BSSes) CTRL-EVENT-SCAN-RESULTS Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:16:b6:da:6f:f2 ssid='mxtelecom' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 skip - blacklisted Try to find non-WPA AP 0: 00:16:b6:da:6f:f2 ssid='mxtelecom' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 skip - blacklisted No APs found - clear blacklist and try again Removed BSSID 00:16:b6:da:6f:f2 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:16:b6:da:6f:f2 ssid='mxtelecom' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 selected based on WPA IE selected WPA AP 00:16:b6:da:6f:f2 ssid='mxtelecom' Try to find non-WPA AP Already associated with the selected AP. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID 00:16:b6:da:6f:f2 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds ==> /var/log/syslog <== Sep 30 22:11:53 t40p kernel: [ 2635.432061] ath0: authenticate with AP 00:16:b6:da:6f:f2 Sep 30 22:11:53 t40p kernel: [ 2635.433552] ath0: authenticated Sep 30 22:11:53 t40p kernel: [ 2635.433568] ath0: associate with AP 00:16:b6:da:6f:f2 Sep 30 22:11:53 t40p NetworkManager: (ath0): supplicant connection state change: 2 -> 4 Sep 30 22:11:53 t40p kernel: [ 2635.435993] ath0: RX ReassocResp from 00:16:b6:da:6f:f2 (capab=0x411 status=0 aid=1) Sep 30 22:11:53 t40p kernel: [ 2635.436036] ath0: associated ==> /var/log/wpa_supplicant.log <== RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8c02 len=165 WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00096d7874656c65636f6d010402040b16dd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020104)' Association info event req_ies - hexdump(len=41): 00 09 6d 78 74 65 6c 65 63 6f 6d 01 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 01 04 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:16:b6:da:6f:f2 State: SCANNING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:16:b6:da:6f:f2 No keys have been configured - skip key clearing Associated with 00:16:b6:da:6f:f2 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added ==> /var/log/syslog <== Sep 30 22:11:55 t40p NetworkManager: ath0: link timed out. ==> /var/log/wpa_supplicant.log <== EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) ==> /var/log/syslog <== Sep 30 22:11:57 t40p kernel: [ 2639.148999] ath0: disassociating by local choice (reason=3) Sep 30 22:11:57 t40p NetworkManager: Activation (ath0/wireless): association took too long. Sep 30 22:11:57 t40p NetworkManager: (ath0): device state change: 5 -> 6 Sep 30 22:11:57 t40p NetworkManager: Activation (ath0/wireless): asking for new secrets Sep 30 22:11:57 t40p NetworkManager: Activation (ath0) Stage 1 of 5 (Device Prepare) scheduled... Sep 30 22:11:57 t40p NetworkManager: (ath0): supplicant connection state change: 4 -> 0 Sep 30 22:11:57 t40p NetworkManager: Activation (ath0) Stage 1 of 5 (Device Prepare) started... Sep 30 22:11:57 t40p NetworkManager: (ath0): device state change: 6 -> 4 Sep 30 22:11:57 t40p NetworkManager: Activation (ath0) Stage 2 of 5 (Device Configure) scheduled... Sep 30 22:11:57 t40p NetworkManager: Activation (ath0) Stage 1 of 5 (Device Prepare) complete. Sep 30 22:11:57 t40p NetworkManager: Activation (ath0) Stage 2 of 5 (Device Configure) starting... Sep 30 22:11:57 t40p NetworkManager: (ath0): device state change: 4 -> 5 Sep 30 22:11:57 t40p NetworkManager: Activation (ath0/wireless): connection 'mxtelecom' has security, and secrets exist. No new secrets needed. Sep 30 22:11:57 t40p NetworkManager: Config: added 'ssid' value 'mxtelecom' Sep 30 22:11:57 t40p NetworkManager: Config: added 'scan_ssid' value '1' Sep 30 22:11:57 t40p NetworkManager: Config: added 'key_mgmt' value 'WPA-PSK' Sep 30 22:11:57 t40p NetworkManager: Config: added 'psk' value '' Sep 30 22:11:57 t40p NetworkManager: Config: added 'proto' value 'WPA RSN' Sep 30 22:11:57 t40p NetworkManager: Config: added 'pairwise' value 'TKIP CCMP' Sep 30 22:11:57 t40p NetworkManager: Config: added 'group' value 'WEP40 WEP104 TKIP CCMP' Sep 30 22:11:57 t40p NetworkManager: Activation (ath0) Stage 2 of 5 (Device Configure) complete. Sep 30 22:11:57 t40p NetworkManager: Config: set interface ap_scan to 1 Sep 30 22:11:57 t40p NetworkManager: (ath0): supplicant connection state change: 0 -> 2 ==> /var/log/wpa_supplicant.log <== wpa_driver_wext_disassociate No keys have been configured - skip key clearing State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 No keys have been configured - skip key clearing State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Added BSSID 00:00:00:00:00:00 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 Driver did not support SIOCSIWENCODEEXT State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added pairwise: 0x18 ssid - hexdump_ascii(len=9): 6d 78 74 65 6c 65 63 6f 6d mxtelecom group: 0x1e proto: 0x3 key_mgmt: 0x2 PSK - hexdump(len=32): [REMOVED] scan_ssid=1 (0x1) Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan (specific SSID) Scan SSID - hexdump_ascii(len=9): 6d 78 74 65 6c 65 63 6f 6d mxtelecom Scan requested (ret=0) - scan timeout 30 seconds Setting scan request: 0 sec 0 usec Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds ==> /var/log/syslog <== Sep 30 22:11:58 t40p NetworkManager: (ath0): supplicant connection state change: 2 -> 3 Sep 30 22:11:58 t40p kernel: [ 2640.238120] ath0: authenticate with AP 00:16:b6:da:6f:f2 Sep 30 22:11:58 t40p kernel: [ 2640.239720] ath0: authenticated Sep 30 22:11:58 t40p kernel: [ 2640.239736] ath0: associate with AP 00:16:b6:da:6f:f2 Sep 30 22:11:58 t40p NetworkManager: (ath0): supplicant connection state change: 3 -> 4 Sep 30 22:11:58 t40p NetworkManager: (ath0): supplicant connection state change: 4 -> 5 Sep 30 22:11:58 t40p kernel: [ 2640.242114] ath0: RX ReassocResp from 00:16:b6:da:6f:f2 (capab=0x411 status=0 aid=1) Sep 30 22:11:58 t40p kernel: [ 2640.242120] ath0: associated Sep 30 22:11:58 t40p NetworkManager: (ath0): supplicant connection state change: 5 -> 6 ==> /var/log/wpa_supplicant.log <== RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b19 len=8 Received 279 bytes of scan results (1 BSSes) CTRL-EVENT-SCAN-RESULTS Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:16:b6:da:6f:f2 ssid='mxtelecom' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 selected based on WPA IE selected WPA AP 00:16:b6:da:6f:f2 ssid='mxtelecom' Try to find non-WPA AP Trying to associate with 00:16:b6:da:6f:f2 (SSID='mxtelecom' freq=2427 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 WPA: using IEEE 802.11i/D3.0 WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1 WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK TKIP WPA: using KEY_MGMT WPA-PSK WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8c02 len=165 WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00096d7874656c65636f6d010402040b16dd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020104)' Association info event req_ies - hexdump(len=41): 00 09 6d 78 74 65 6c 65 63 6f 6d 01 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 01 04 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:16:b6:da:6f:f2 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:16:b6:da:6f:f2 No keys have been configured - skip key clearing Associated with 00:16:b6:da:6f:f2 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added RX EAPOL from 00:16:b6:da:6f:f2 RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 bb 1a 90 d9 a1 4a 68 5f a2 af 45 cc 05 da ca bc 3a 68 41 f7 2b 38 7a 99 0a c9 c2 a6 f5 06 10 ee 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): bb 1a 90 d9 a1 4a 68 5f a2 af 45 cc 05 da ca bc 3a 68 41 f7 2b 38 7a 99 0a c9 c2 a6 f5 06 10 ee key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 bb 1a 90 d9 a1 4a 68 5f a2 af 45 cc 05 da ca bc 3a 68 41 f7 2b 38 7a 99 0a c9 c2 a6 f5 06 10 ee 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:16:b6:da:6f:f2 (ver=1) WPA: Renewed SNonce - hexdump(len=32): 84 85 92 27 36 ad a2 25 a3 79 c2 96 52 2d 54 68 24 50 2f 78 ea 56 ca c7 c0 7d bf 71 03 a0 36 39 WPA: PTK derivation - A1=00:05:4e:40:93:b3 A2=00:16:b6:da:6f:f2 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 84 85 92 27 36 ad a2 25 a3 79 c2 96 52 2d 54 68 24 50 2f 78 ea 56 ca c7 c0 7d bf 71 03 a0 36 39 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc b0 b2 00 81 74 f8 da b0 fe 4e a6 cb bd 4b 10 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RX EAPOL from 00:16:b6:da:6f:f2 RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 bb 1a 90 d9 a1 4a 68 5f a2 af 45 cc 05 da ca bc 3a 68 41 f7 2b 38 7a 99 0a c9 c2 a6 f5 06 10 ee 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 41 ca 9e 6e 45 84 21 92 7b c4 8a 15 76 36 59 ca 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 IEEE 802.1X RX: version=1 type=3 length=121 EAPOL-Key type=254 key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) key_length=32 key_data_length=26 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): bb 1a 90 d9 a1 4a 68 5f a2 af 45 cc 05 da ca bc 3a 68 41 f7 2b 38 7a 99 0a c9 c2 a6 f5 06 10 ee key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 41 ca 9e 6e 45 84 21 92 7b c4 8a 15 76 36 59 ca WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 bb 1a 90 d9 a1 4a 68 5f a2 af 45 cc 05 da ca bc 3a 68 41 f7 2b 38 7a 99 0a c9 c2 a6 f5 06 10 ee 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 41 ca 9e 6e 45 84 21 92 7b c4 8a 15 76 36 59 ca 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:16:b6:da:6f:f2 (ver=1) WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09 fb 5f a7 ac 49 c4 18 22 7d 86 12 98 5a 24 a1 00 00 WPA: Installing PTK to the driver. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) ==> /var/log/syslog <== Sep 30 22:12:02 t40p kernel: [ 2644.245931] ath0: deauthenticated Sep 30 22:12:02 t40p NetworkManager: (ath0): supplicant connection state change: 6 -> 0 Sep 30 22:12:02 t40p NetworkManager: (ath0): supplicant connection state change: 0 -> 2 ==> /var/log/wpa_supplicant.log <== RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec BSSID 00:16:b6:da:6f:f2 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: GROUP_HANDSHAKE -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added State: DISCONNECTED -> SCANNING Starting AP scan (specific SSID) Scan SSID - hexdump_ascii(len=9): 6d 78 74 65 6c 65 63 6f 6d mxtelecom Scan requested (ret=0) - scan timeout 30 seconds ==> /var/log/syslog <== Sep 30 22:12:03 t40p kernel: [ 2645.244063] ath0: authenticate with AP 00:16:b6:da:6f:f2 Sep 30 22:12:03 t40p kernel: [ 2645.245666] ath0: authenticated Sep 30 22:12:03 t40p kernel: [ 2645.245683] ath0: associate with AP 00:16:b6:da:6f:f2 Sep 30 22:12:03 t40p NetworkManager: (ath0): supplicant connection state change: 2 -> 4 Sep 30 22:12:03 t40p kernel: [ 2645.247938] ath0: RX ReassocResp from 00:16:b6:da:6f:f2 (capab=0x411 status=0 aid=1) Sep 30 22:12:03 t40p kernel: [ 2645.247954] ath0: associated ==> /var/log/wpa_supplicant.log <== RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8c02 len=165 WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00096d7874656c65636f6d010402040b16dd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020104)' Association info event req_ies - hexdump(len=41): 00 09 6d 78 74 65 6c 65 63 6f 6d 01 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 01 04 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:16:b6:da:6f:f2 State: SCANNING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:16:b6:da:6f:f2 No keys have been configured - skip key clearing Associated with 00:16:b6:da:6f:f2 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) ==> /var/log/syslog <== Sep 30 22:12:07 t40p NetworkManager: (ath0): supplicant connection state change: 4 -> 0 Sep 30 22:12:07 t40p kernel: [ 2649.949366] ath0: deauthenticated Sep 30 22:12:07 t40p NetworkManager: (ath0): supplicant connection state change: 0 -> 2 ==> /var/log/wpa_supplicant.log <== RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b19 len=8 Received 279 bytes of scan results (1 BSSes) CTRL-EVENT-SCAN-RESULTS Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:16:b6:da:6f:f2 ssid='mxtelecom' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 skip - blacklisted Try to find non-WPA AP 0: 00:16:b6:da:6f:f2 ssid='mxtelecom' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 skip - blacklisted No APs found - clear blacklist and try again Removed BSSID 00:00:00:00:00:00 from blacklist (clear) Removed BSSID 00:16:b6:da:6f:f2 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:16:b6:da:6f:f2 ssid='mxtelecom' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 selected based on WPA IE selected WPA AP 00:16:b6:da:6f:f2 ssid='mxtelecom' Try to find non-WPA AP Already associated with the selected AP. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID 00:16:b6:da:6f:f2 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds ==> /var/log/syslog <== Sep 30 22:12:08 t40p kernel: [ 2650.948063] ath0: authenticate with AP 00:16:b6:da:6f:f2 Sep 30 22:12:08 t40p kernel: [ 2650.949597] ath0: authenticated Sep 30 22:12:08 t40p kernel: [ 2650.949614] ath0: associate with AP 00:16:b6:da:6f:f2 Sep 30 22:12:08 t40p NetworkManager: (ath0): supplicant connection state change: 2 -> 4 Sep 30 22:12:08 t40p kernel: [ 2650.952060] ath0: RX ReassocResp from 00:16:b6:da:6f:f2 (capab=0x411 status=0 aid=1) Sep 30 22:12:08 t40p kernel: [ 2650.952076] ath0: associated ==> /var/log/wpa_supplicant.log <== RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8c02 len=165 WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00096d7874656c65636f6d010402040b16dd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020104)' Association info event req_ies - hexdump(len=41): 00 09 6d 78 74 65 6c 65 63 6f 6d 01 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 01 04 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:16:b6:da:6f:f2 State: SCANNING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:16:b6:da:6f:f2 No keys have been configured - skip key clearing Associated with 00:16:b6:da:6f:f2 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) ==> /var/log/syslog <== Sep 30 22:12:13 t40p NetworkManager: (ath0): supplicant connection state change: 4 -> 0 Sep 30 22:12:13 t40p kernel: [ 2655.694352] ath0: deauthenticated Sep 30 22:12:13 t40p NetworkManager: (ath0): supplicant connection state change: 0 -> 2 ==> /var/log/wpa_supplicant.log <== RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b19 len=8 Received 279 bytes of scan results (1 BSSes) CTRL-EVENT-SCAN-RESULTS Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:16:b6:da:6f:f2 ssid='mxtelecom' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 selected based on WPA IE selected WPA AP 00:16:b6:da:6f:f2 ssid='mxtelecom' Try to find non-WPA AP Already associated with the selected AP. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec BSSID 00:16:b6:da:6f:f2 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added State: DISCONNECTED -> SCANNING Starting AP scan (specific SSID) Scan SSID - hexdump_ascii(len=9): 6d 78 74 65 6c 65 63 6f 6d mxtelecom Scan requested (ret=0) - scan timeout 30 seconds ==> /var/log/syslog <== Sep 30 22:12:14 t40p kernel: [ 2656.692067] ath0: authenticate with AP 00:16:b6:da:6f:f2 Sep 30 22:12:14 t40p kernel: [ 2656.694874] ath0: authenticated Sep 30 22:12:14 t40p kernel: [ 2656.694891] ath0: associate with AP 00:16:b6:da:6f:f2 Sep 30 22:12:14 t40p kernel: [ 2656.697422] ath0: RX ReassocResp from 00:16:b6:da:6f:f2 (capab=0x411 status=0 aid=1) Sep 30 22:12:14 t40p kernel: [ 2656.697437] ath0: associated Sep 30 22:12:14 t40p NetworkManager: (ath0): supplicant connection state change: 2 -> 4 ==> /var/log/wpa_supplicant.log <== RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8c02 len=165 WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00096d7874656c65636f6d010402040b16dd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020104)' Association info event req_ies - hexdump(len=41): 00 09 6d 78 74 65 6c 65 63 6f 6d 01 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 01 04 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:16:b6:da:6f:f2 State: SCANNING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:16:b6:da:6f:f2 No keys have been configured - skip key clearing Associated with 00:16:b6:da:6f:f2 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added ==> /var/log/syslog <== Sep 30 22:12:17 t40p NetworkManager: ath0: link timed out. ==> /var/log/wpa_supplicant.log <== EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) ==> /var/log/syslog <== Sep 30 22:12:19 t40p NetworkManager: (ath0): supplicant connection state change: 4 -> 0 Sep 30 22:12:19 t40p kernel: [ 2661.442389] ath0: deauthenticated Sep 30 22:12:19 t40p NetworkManager: (ath0): supplicant connection state change: 0 -> 2 ==> /var/log/wpa_supplicant.log <== RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b19 len=8 Received 279 bytes of scan results (1 BSSes) CTRL-EVENT-SCAN-RESULTS Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:16:b6:da:6f:f2 ssid='mxtelecom' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 skip - blacklisted Try to find non-WPA AP 0: 00:16:b6:da:6f:f2 ssid='mxtelecom' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 skip - blacklisted No APs found - clear blacklist and try again Removed BSSID 00:16:b6:da:6f:f2 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:16:b6:da:6f:f2 ssid='mxtelecom' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 selected based on WPA IE selected WPA AP 00:16:b6:da:6f:f2 ssid='mxtelecom' Try to find non-WPA AP Already associated with the selected AP. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID 00:16:b6:da:6f:f2 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds ==> /var/log/syslog <== Sep 30 22:12:20 t40p kernel: [ 2662.440061] ath0: authenticate with AP 00:16:b6:da:6f:f2 Sep 30 22:12:20 t40p kernel: [ 2662.441534] ath0: authenticated Sep 30 22:12:20 t40p kernel: [ 2662.441551] ath0: associate with AP 00:16:b6:da:6f:f2 Sep 30 22:12:20 t40p kernel: [ 2662.443929] ath0: RX ReassocResp from 00:16:b6:da:6f:f2 (capab=0x411 status=0 aid=1) Sep 30 22:12:20 t40p kernel: [ 2662.443945] ath0: associated Sep 30 22:12:20 t40p NetworkManager: (ath0): supplicant connection state change: 2 -> 4 ==> /var/log/wpa_supplicant.log <== RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8c02 len=165 WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00096d7874656c65636f6d010402040b16dd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020104)' Association info event req_ies - hexdump(len=41): 00 09 6d 78 74 65 6c 65 63 6f 6d 01 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 01 04 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:16:b6:da:6f:f2 State: SCANNING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:16:b6:da:6f:f2 No keys have been configured - skip key clearing Associated with 00:16:b6:da:6f:f2 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added ==> /var/log/syslog <== Sep 30 22:12:22 t40p NetworkManager: Activation (ath0/wireless): association took too long. Sep 30 22:12:22 t40p NetworkManager: (ath0): device state change: 5 -> 6 Sep 30 22:12:22 t40p NetworkManager: Activation (ath0/wireless): asking for new secrets Sep 30 22:12:22 t40p kernel: [ 2664.200612] ath0: disassociating by local choice (reason=3) Sep 30 22:12:22 t40p NetworkManager: Activation (ath0) Stage 1 of 5 (Device Prepare) scheduled... Sep 30 22:12:22 t40p NetworkManager: (ath0): supplicant connection state change: 4 -> 0 Sep 30 22:12:22 t40p NetworkManager: Activation (ath0) Stage 1 of 5 (Device Prepare) started... Sep 30 22:12:22 t40p NetworkManager: (ath0): device state change: 6 -> 4 Sep 30 22:12:22 t40p NetworkManager: Activation (ath0) Stage 2 of 5 (Device Configure) scheduled... Sep 30 22:12:22 t40p NetworkManager: Activation (ath0) Stage 1 of 5 (Device Prepare) complete. Sep 30 22:12:22 t40p NetworkManager: Activation (ath0) Stage 2 of 5 (Device Configure) starting... Sep 30 22:12:22 t40p NetworkManager: (ath0): device state change: 4 -> 5 Sep 30 22:12:22 t40p NetworkManager: Activation (ath0/wireless): connection 'mxtelecom' has security, and secrets exist. No new secrets needed. Sep 30 22:12:22 t40p NetworkManager: Config: added 'ssid' value 'mxtelecom' Sep 30 22:12:22 t40p NetworkManager: Config: added 'scan_ssid' value '1' Sep 30 22:12:22 t40p NetworkManager: Config: added 'key_mgmt' value 'WPA-PSK' Sep 30 22:12:22 t40p NetworkManager: Config: added 'psk' value '' Sep 30 22:12:22 t40p NetworkManager: Config: added 'proto' value 'WPA RSN' Sep 30 22:12:22 t40p NetworkManager: Config: added 'pairwise' value 'TKIP CCMP' Sep 30 22:12:22 t40p NetworkManager: Config: added 'group' value 'WEP40 WEP104 TKIP CCMP' Sep 30 22:12:22 t40p NetworkManager: Activation (ath0) Stage 2 of 5 (Device Configure) complete. Sep 30 22:12:22 t40p NetworkManager: Config: set interface ap_scan to 1 Sep 30 22:12:22 t40p NetworkManager: (ath0): supplicant connection state change: 0 -> 2 ==> /var/log/wpa_supplicant.log <== wpa_driver_wext_disassociate No keys have been configured - skip key clearing State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 No keys have been configured - skip key clearing State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Added BSSID 00:00:00:00:00:00 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 Driver did not support SIOCSIWENCODEEXT State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added pairwise: 0x18 ssid - hexdump_ascii(len=9): 6d 78 74 65 6c 65 63 6f 6d mxtelecom group: 0x1e proto: 0x3 key_mgmt: 0x2 PSK - hexdump(len=32): [REMOVED] scan_ssid=1 (0x1) Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan (specific SSID) Scan SSID - hexdump_ascii(len=9): 6d 78 74 65 6c 65 63 6f 6d mxtelecom Scan requested (ret=0) - scan timeout 30 seconds EAPOL: startWhen --> 0 EAPOL: disable timer tick ==> /var/log/syslog <== Sep 30 22:12:25 t40p NetworkManager: (ath0): supplicant connection state change: 2 -> 3 Sep 30 22:12:25 t40p kernel: [ 2667.180729] ath0: authenticate with AP 00:16:b6:da:6f:f2 Sep 30 22:12:25 t40p kernel: [ 2667.182310] ath0: authenticated Sep 30 22:12:25 t40p kernel: [ 2667.182326] ath0: associate with AP 00:16:b6:da:6f:f2 Sep 30 22:12:25 t40p NetworkManager: (ath0): supplicant connection state change: 3 -> 4 Sep 30 22:12:25 t40p NetworkManager: (ath0): supplicant connection state change: 4 -> 5 Sep 30 22:12:25 t40p kernel: [ 2667.184622] ath0: RX ReassocResp from 00:16:b6:da:6f:f2 (capab=0x411 status=0 aid=1) Sep 30 22:12:25 t40p kernel: [ 2667.184637] ath0: associated Sep 30 22:12:25 t40p NetworkManager: (ath0): supplicant connection state change: 5 -> 6 ==> /var/log/wpa_supplicant.log <== RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b19 len=8 Received 279 bytes of scan results (1 BSSes) CTRL-EVENT-SCAN-RESULTS Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:16:b6:da:6f:f2 ssid='mxtelecom' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 selected based on WPA IE selected WPA AP 00:16:b6:da:6f:f2 ssid='mxtelecom' Try to find non-WPA AP Trying to associate with 00:16:b6:da:6f:f2 (SSID='mxtelecom' freq=2427 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 WPA: using IEEE 802.11i/D3.0 WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1 WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK TKIP WPA: using KEY_MGMT WPA-PSK WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8c02 len=165 WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00096d7874656c65636f6d010402040b16dd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020104)' Association info event req_ies - hexdump(len=41): 00 09 6d 78 74 65 6c 65 63 6f 6d 01 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 01 04 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:16:b6:da:6f:f2 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:16:b6:da:6f:f2 No keys have been configured - skip key clearing Associated with 00:16:b6:da:6f:f2 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added RX EAPOL from 00:16:b6:da:6f:f2 RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 bb 1a 90 d9 a1 4a 68 5f a2 af 45 cc 05 da ca bc 3a 68 41 f7 2b 38 7a 99 0a c9 c2 a6 f5 06 10 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): bb 1a 90 d9 a1 4a 68 5f a2 af 45 cc 05 da ca bc 3a 68 41 f7 2b 38 7a 99 0a c9 c2 a6 f5 06 10 f3 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 bb 1a 90 d9 a1 4a 68 5f a2 af 45 cc 05 da ca bc 3a 68 41 f7 2b 38 7a 99 0a c9 c2 a6 f5 06 10 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:16:b6:da:6f:f2 (ver=1) WPA: Renewed SNonce - hexdump(len=32): 81 70 7f 05 e4 75 8a 10 69 82 39 a7 c8 df 2a 0b 44 69 cb 4c 0b cb 5c d0 40 3e b8 ee 85 aa 4f 88 WPA: PTK derivation - A1=00:05:4e:40:93:b3 A2=00:16:b6:da:6f:f2 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 81 70 7f 05 e4 75 8a 10 69 82 39 a7 c8 df 2a 0b 44 69 cb 4c 0b cb 5c d0 40 3e b8 ee 85 aa 4f 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 75 9c 9f b4 24 d0 5b 68 dd 40 9c d7 7b 15 57 96 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RX EAPOL from 00:16:b6:da:6f:f2 RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 bb 1a 90 d9 a1 4a 68 5f a2 af 45 cc 05 da ca bc 3a 68 41 f7 2b 38 7a 99 0a c9 c2 a6 f5 06 10 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 57 5f 44 bd 8d ce fb 3c aa 10 1a 54 2b be 85 27 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 IEEE 802.1X RX: version=1 type=3 length=121 EAPOL-Key type=254 key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) key_length=32 key_data_length=26 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): bb 1a 90 d9 a1 4a 68 5f a2 af 45 cc 05 da ca bc 3a 68 41 f7 2b 38 7a 99 0a c9 c2 a6 f5 06 10 f3 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 57 5f 44 bd 8d ce fb 3c aa 10 1a 54 2b be 85 27 WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 bb 1a 90 d9 a1 4a 68 5f a2 af 45 cc 05 da ca bc 3a 68 41 f7 2b 38 7a 99 0a c9 c2 a6 f5 06 10 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 57 5f 44 bd 8d ce fb 3c aa 10 1a 54 2b be 85 27 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:16:b6:da:6f:f2 (ver=1) WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b1 cf 53 71 58 17 75 eb 86 f5 fa ef 16 73 00 c5 00 00 WPA: Installing PTK to the driver. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) ==> /var/log/syslog <== Sep 30 22:12:29 t40p kernel: [ 2671.194772] ath0: deauthenticated Sep 30 22:12:29 t40p NetworkManager: (ath0): supplicant connection state change: 6 -> 0 ==> /var/log/wpa_supplicant.log <== RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec BSSID 00:16:b6:da:6f:f2 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: GROUP_HANDSHAKE -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added ==> /var/log/syslog <== Sep 30 22:12:29 t40p NetworkManager: (ath0): supplicant connection state change: 0 -> 2 Sep 30 22:12:30 t40p kernel: [ 2672.192064] ath0: authenticate with AP 00:16:b6:da:6f:f2 Sep 30 22:12:30 t40p kernel: [ 2672.193634] ath0: authenticated Sep 30 22:12:30 t40p kernel: [ 2672.193652] ath0: associate with AP 00:16:b6:da:6f:f2 Sep 30 22:12:30 t40p NetworkManager: (ath0): supplicant connection state change: 2 -> 4 Sep 30 22:12:30 t40p kernel: [ 2672.196097] ath0: RX ReassocResp from 00:16:b6:da:6f:f2 (capab=0x411 status=0 aid=1) Sep 30 22:12:30 t40p kernel: [ 2672.196112] ath0: associated ==> /var/log/wpa_supplicant.log <== State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8c02 len=165 WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00096d7874656c65636f6d010402040b16dd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020104)' Association info event req_ies - hexdump(len=41): 00 09 6d 78 74 65 6c 65 63 6f 6d 01 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 01 04 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:16:b6:da:6f:f2 State: SCANNING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:16:b6:da:6f:f2 No keys have been configured - skip key clearing Associated with 00:16:b6:da:6f:f2 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) ==> /var/log/syslog <== Sep 30 22:12:34 t40p NetworkManager: (ath0): supplicant connection state change: 4 -> 0 Sep 30 22:12:34 t40p kernel: [ 2676.907936] ath0: deauthenticated Sep 30 22:12:34 t40p NetworkManager: (ath0): supplicant connection state change: 0 -> 2 ==> /var/log/wpa_supplicant.log <== RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b19 len=8 Received 279 bytes of scan results (1 BSSes) CTRL-EVENT-SCAN-RESULTS Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:16:b6:da:6f:f2 ssid='mxtelecom' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 skip - blacklisted Try to find non-WPA AP 0: 00:16:b6:da:6f:f2 ssid='mxtelecom' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 skip - blacklisted No APs found - clear blacklist and try again Removed BSSID 00:00:00:00:00:00 from blacklist (clear) Removed BSSID 00:16:b6:da:6f:f2 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:16:b6:da:6f:f2 ssid='mxtelecom' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 selected based on WPA IE selected WPA AP 00:16:b6:da:6f:f2 ssid='mxtelecom' Try to find non-WPA AP Already associated with the selected AP. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID 00:16:b6:da:6f:f2 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added State: DISCONNECTED -> SCANNING Starting AP scan (specific SSID) Scan SSID - hexdump_ascii(len=9): 6d 78 74 65 6c 65 63 6f 6d mxtelecom Scan requested (ret=0) - scan timeout 30 seconds ==> /var/log/syslog <== Sep 30 22:12:35 t40p kernel: [ 2677.904168] ath0: authenticate with AP 00:16:b6:da:6f:f2 Sep 30 22:12:35 t40p kernel: [ 2677.905735] ath0: authenticated Sep 30 22:12:35 t40p kernel: [ 2677.905755] ath0: associate with AP 00:16:b6:da:6f:f2 Sep 30 22:12:35 t40p NetworkManager: (ath0): supplicant connection state change: 2 -> 4 Sep 30 22:12:35 t40p kernel: [ 2677.908194] ath0: RX ReassocResp from 00:16:b6:da:6f:f2 (capab=0x411 status=0 aid=1) Sep 30 22:12:35 t40p kernel: [ 2677.908210] ath0: associated ==> /var/log/wpa_supplicant.log <== RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8c02 len=165 WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00096d7874656c65636f6d010402040b16dd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020104)' Association info event req_ies - hexdump(len=41): 00 09 6d 78 74 65 6c 65 63 6f 6d 01 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 01 04 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:16:b6:da:6f:f2 State: SCANNING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:16:b6:da:6f:f2 No keys have been configured - skip key clearing Associated with 00:16:b6:da:6f:f2 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added