* Connection Problems with on QCA9880-BR4A
@ 2016-11-11 12:07 Felix
2016-11-14 7:56 ` Michal Kazior
0 siblings, 1 reply; 6+ messages in thread
From: Felix @ 2016-11-11 12:07 UTC (permalink / raw)
To: ath10k
Hello,
I am running a Debian Jessie server on the backports kernel
4.7.0-0.bpo.1-amd64. An Ubiquiti SR71 with its AR928X is working just
fine under ath9k.
The mikrotik R11e-5HacT with its QCA9880-BR4A is recognized after some
errors trying to load inexistent files with the standard firmware-5.bin
from the Jessie Backports (10.2.4.70.54):
...ath10k_pci 0000:02:00.0: firmware: failed to load
ath10k/pre-cal-pci-0000:02:00.0.bin (-2)
...ath10k_pci 0000:02:00.0: Direct firmware load for
ath10k/pre-cal-pci-0000:02:00.0.bin failed with error -2
...ath10k_pci 0000:02:00.0: firmware: failed to load
ath10k/cal-pci-0000:02:00.0.bin (-2)
...ath10k_pci 0000:02:00.0: Direct firmware load for
ath10k/cal-pci-0000:02:00.0.bin failed with error -2
...ath10k_pci 0000:02:00.0: firmware: failed to load
ath10k/QCA988X/hw2.0/board-2.bin (-2)
...ath10k_pci 0000:02:00.0: Direct firmware load for
ath10k/QCA988X/hw2.0/board-2.bin failed with error -2
There are many reports on working devices with these errors on the web
so I suppose they can be ignored.
The device seems to work (iw scan shows better results than the SR71),
but after connection to the AP via wpa_supplicant, dhclient is unable to
retrieve an IP-adress. I have tried the newer firmware (10.2.4.70.58)
and the older ones as well as those from candela without success. On
older firmwares additional errors up to firmware crash on iw set
bitrates appear.
Regards,
Felix
_______________________________________________
ath10k mailing list
ath10k@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/ath10k
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: Connection Problems with on QCA9880-BR4A
2016-11-11 12:07 Connection Problems with on QCA9880-BR4A Felix
@ 2016-11-14 7:56 ` Michal Kazior
2016-11-15 12:59 ` Felix
0 siblings, 1 reply; 6+ messages in thread
From: Michal Kazior @ 2016-11-14 7:56 UTC (permalink / raw)
To: Felix; +Cc: ath10k@lists.infradead.org
On 11 November 2016 at 13:07, Felix <kramerfe@gmail.com> wrote:
> Hello,
>
> I am running a Debian Jessie server on the backports kernel
> 4.7.0-0.bpo.1-amd64. An Ubiquiti SR71 with its AR928X is working just fine
> under ath9k.
>
> The mikrotik R11e-5HacT with its QCA9880-BR4A is recognized after some
> errors trying to load inexistent files with the standard firmware-5.bin from
> the Jessie Backports (10.2.4.70.54):
> ...ath10k_pci 0000:02:00.0: firmware: failed to load
> ath10k/pre-cal-pci-0000:02:00.0.bin (-2)
> ...ath10k_pci 0000:02:00.0: Direct firmware load for
> ath10k/pre-cal-pci-0000:02:00.0.bin failed with error -2
> ...ath10k_pci 0000:02:00.0: firmware: failed to load
> ath10k/cal-pci-0000:02:00.0.bin (-2)
> ...ath10k_pci 0000:02:00.0: Direct firmware load for
> ath10k/cal-pci-0000:02:00.0.bin failed with error -2
> ...ath10k_pci 0000:02:00.0: firmware: failed to load
> ath10k/QCA988X/hw2.0/board-2.bin (-2)
> ...ath10k_pci 0000:02:00.0: Direct firmware load for
> ath10k/QCA988X/hw2.0/board-2.bin failed with error -2
> There are many reports on working devices with these errors on the web so I
> suppose they can be ignored.
Correct. These are just overly verbose messages from the kernel as
ath10k probes latest-to-oldest firmware files in fallback fashion.
> The device seems to work (iw scan shows better results than the SR71), but
> after connection to the AP via wpa_supplicant, dhclient is unable to
> retrieve an IP-adress.
Did you check tcpdump on the interface to see if it is getting any
traffic? Did you try ping6 ff02::1%wlanX ? Are you using WPA, WEP,
8021X? VLANs? 4addr mode?
> I have tried the newer firmware (10.2.4.70.58) and
> the older ones as well as those from candela without success. On older
> firmwares additional errors up to firmware crash on iw set bitrates appear.
Interesting. Are you using multiple interfaces on ath10k? Is the
interface you're running "set bitrates" on really associated?
What is the AP saying about the client association state? Is it
running hostapd? Does it receive any traffic from the client
(tcpdump)?
Michał
_______________________________________________
ath10k mailing list
ath10k@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/ath10k
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: Connection Problems with on QCA9880-BR4A
2016-11-14 7:56 ` Michal Kazior
@ 2016-11-15 12:59 ` Felix
2016-11-15 13:48 ` Michal Kazior
0 siblings, 1 reply; 6+ messages in thread
From: Felix @ 2016-11-15 12:59 UTC (permalink / raw)
To: Michal Kazior; +Cc: ath10k@lists.infradead.org
I have disabled IPV6 completely, therefore ping6 is not possible at the
moment. Here some more information:
>> iwconfig wlan0
wlan0 IEEE 802.11 ESSID:"eduroam"
Mode:Managed Frequency:5.18 GHz Access Point: XXX
Bit Rate=6 Mb/s Tx-Power=17 dBm
Retry short limit:7 RTS thr:off Fragment thr:off
Encryption key:off
Power Management:off
Link Quality=29/70 Signal level=-81 dBm
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:2 Invalid misc:60 Missed beacon:0
>> lspci -vvnn
02:00.0 Network controller [0280]: Qualcomm Atheros QCA988x 802.11ac
Wireless Network Adapter [168c:003c]
Subsystem: Device [19b6:d03c]
Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr-
Stepping- SERR- FastB2B- DisINTx+
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort-
<TAbort- <MAbort- >SERR- <PERR- INTx+
Latency: 0
Interrupt: pin A routed to IRQ 125
Region 0: Memory at 91000000 (64-bit, non-prefetchable) [size=2M]
Expansion ROM at 91200000 [disabled] [size=64K]
Capabilities: [40] Power Management version 2
Flags: PMEClk- DSI- D1+ D2+ AuxCurrent=375mA
PME(D0-,D1-,D2-,D3hot-,D3cold-)
Status: D0 NoSoftRst- PME-Enable- DSel=0 DScale=0 PME-
Capabilities: [50] MSI: Enable+ Count=1/8 Maskable+ 64bit-
Address: fee0100c Data: 41c2
Masking: 00fe00fe Pending: 00000000
Capabilities: [70] Express (v2) Endpoint, MSI 00
DevCap: MaxPayload 256 bytes, PhantFunc 0, Latency L0s
unlimited, L1 <64us
ExtTag- AttnBtn- AttnInd- PwrInd- RBE+ FLReset-
DevCtl: Report errors: Correctable- Non-Fatal- Fatal-
Unsupported-
RlxdOrd+ ExtTag- PhantFunc- AuxPwr- NoSnoop-
MaxPayload 128 bytes, MaxReadReq 512 bytes
DevSta: CorrErr+ UncorrErr- FatalErr- UnsuppReq- AuxPwr-
TransPend-
LnkCap: Port #0, Speed 2.5GT/s, Width x1, ASPM L0s L1, Exit
Latency L0s <4us, L1 <64us
ClockPM- Surprise- LLActRep- BwNot-
LnkCtl: ASPM Disabled; RCB 64 bytes Disabled- CommClk+
ExtSynch- ClockPM- AutWidDis- BWInt- AutBWInt-
LnkSta: Speed 2.5GT/s, Width x1, TrErr- Train- SlotClk+
DLActive- BWMgmt- ABWMgmt-
DevCap2: Completion Timeout: Not Supported, TimeoutDis+, LTR-,
OBFF Not Supported
DevCtl2: Completion Timeout: 50us to 50ms, TimeoutDis-, LTR-,
OBFF Disabled
LnkCtl2: Target Link Speed: 2.5GT/s, EnterCompliance- SpeedDis-
Transmit Margin: Normal Operating Range,
EnterModifiedCompliance- ComplianceSOS-
Compliance De-emphasis: -6dB
LnkSta2: Current De-emphasis Level: -6dB,
EqualizationComplete-, EqualizationPhase1-
EqualizationPhase2-, EqualizationPhase3-,
LinkEqualizationRequest-
Capabilities: [100 v1] Advanced Error Reporting
UESta: DLP- SDES- TLP- FCP- CmpltTO- CmpltAbrt- UnxCmplt-
RxOF- MalfTLP- ECRC- UnsupReq- ACSViol-
UEMsk: DLP- SDES- TLP- FCP- CmpltTO- CmpltAbrt- UnxCmplt-
RxOF- MalfTLP- ECRC- UnsupReq- ACSViol-
UESvrt: DLP+ SDES+ TLP- FCP+ CmpltTO- CmpltAbrt- UnxCmplt-
RxOF+ MalfTLP+ ECRC- UnsupReq- ACSViol-
CESta: RxErr- BadTLP- BadDLLP- Rollover- Timeout- NonFatalErr-
CEMsk: RxErr- BadTLP- BadDLLP- Rollover- Timeout- NonFatalErr+
AERCap: First Error Pointer: 00, GenCap- CGenEn- ChkCap- ChkEn-
Capabilities: [140 v1] Virtual Channel
Caps: LPEVC=0 RefClk=100ns PATEntryBits=1
Arb: Fixed- WRR32- WRR64- WRR128-
Ctrl: ArbSelect=Fixed
Status: InProgress-
VC0: Caps: PATOffset=00 MaxTimeSlots=1 RejSnoopTrans-
Arb: Fixed- WRR32- WRR64- WRR128- TWRR128- WRR256-
Ctrl: Enable+ ID=0 ArbSelect=Fixed TC/VC=ff
Status: NegoPending- InProgress-
Capabilities: [160 v1] Device Serial Number 00-00-00-00-00-00-00-00
Kernel driver in use: ath10k_pci
>> cat /etc/wpa_supplicant/wpa_supplicant.conf
ctrl_interface=/var/run/wpa_supplicant
network={
ssid="eduroam"
proto=RSN
pairwise=CCMP
group=CCMP
key_mgmt=WPA-EAP
eap=TTLS
domain_suffix_match="XXX"
phase1="peaplabel=0"
anonymous_identity="anonymous@XXX"
phase2="auth=PAP"
ca_cert="XXX"
identity="XXX"
password="XXX"
}
>> wpa_supplicant -i wlan0 -D nl80211 -c
/etc/wpa_supplicant/wpa_supplicant.conf
Successfully initialized wpa_supplicant
wlan0: SME: Trying to authenticate with XXX (SSID='eduroam' freq=5240 MHz)
wlan0: Trying to associate with XXX (SSID='eduroam' freq=5240 MHz)
wlan0: Associated with XXX
wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21
wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected
wlan0: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=XXX
wlan0: CTRL-EVENT-EAP-PEER-CERT depth=3 subject='XXX'
wlan0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='XXX'
wlan0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='XXX'
wlan0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='XXX'
wlan0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
wlan0: WPA: Key negotiation completed with XXX [PTK=CCMP GTK=CCMP]
wlan0: CTRL-EVENT-CONNECTED - Connection to XXX completed [id=0 id_str=]
wlan0: CTRL-EVENT-DISCONNECTED bssid=XXX reason=2
>> cat /etc/dhcp/dhclient.conf
option rfc3442-classless-static-routes code 121 = array of unsigned
integer 8;
supersede dhcp-server-identifier 255.255.255.255;
request subnet-mask, broadcast-address, time-offset, routers,
interface-mtu, rfc3442-classless-static-routes;
timeout 30;
retry 30;
>> journalctl -b | grep dhclient
Nov 15 12:32:57 android10278 dhclient[852]: DHCPREQUEST on wlan0 to
255.255.255.255 port 67
Nov 15 12:33:04 android10278 dhclient[852]: DHCPREQUEST on wlan0 to
255.255.255.255 port 67
Nov 15 12:33:23 android10278 dhclient[852]: DHCPREQUEST on wlan0 to
255.255.255.255 port 67
Nov 15 12:33:35 android10278 dhclient[852]: DHCPREQUEST on wlan0 to
255.255.255.255 port 67
Nov 15 12:33:50 android10278 dhclient[852]: DHCPREQUEST on wlan0 to
255.255.255.255 port 67
Nov 15 12:39:50 android10278 dhclient[1608]: DHCPREQUEST on wlan0 to
255.255.255.255 port 67
Nov 15 12:39:58 android10278 dhclient[1608]: DHCPREQUEST on wlan0 to
255.255.255.255 port 67
Nov 15 12:40:19 android10278 dhclient[1608]: DHCPDISCOVER on wlan0 to
255.255.255.255 port 67 interval 3
Nov 15 12:40:22 android10278 dhclient[1608]: DHCPDISCOVER on wlan0 to
255.255.255.255 port 67 interval 5
Nov 15 12:40:27 android10278 dhclient[1608]: DHCPDISCOVER on wlan0 to
255.255.255.255 port 67 interval 9
Nov 15 12:40:36 android10278 dhclient[1608]: DHCPDISCOVER on wlan0 to
255.255.255.255 port 67 interval 14
Nov 15 12:40:50 android10278 dhclient[1608]: No DHCPOFFERS received.
Nov 15 12:40:50 android10278 dhclient[1608]: Trying recorded lease XXX
Nov 15 12:40:53 android10278 root[1625]: /etc/dhcp/dhclient-exit-hooks
returned non-zero exit status 2
Nov 15 12:40:53 android10278 dhclient[1608]: bound: immediate renewal.
Nov 15 12:40:53 android10278 dhclient[1608]: DHCPREQUEST on wlan0 to
255.255.255.255 port 67
Nov 15 12:40:56 android10278 dhclient[1627]: DHCPREQUEST on wlan0 to
255.255.255.255 port 67
Nov 15 12:40:59 android10278 dhclient[1627]: DHCPREQUEST on wlan0 to
255.255.255.255 port 67
Nov 15 12:41:06 android10278 dhclient[1627]: DHCPREQUEST on wlan0 to
255.255.255.255 port 67
>> tcpdump -i wlan0
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on wlan0, link-type EN10MB (Ethernet), capture size 262144 bytes
12:26:31.765188 ARP, Request who-has 8.8.8.8 tell 192.168.0.1, length 28
12:26:31.765227 ARP, Request who-has 8.8.4.4 tell 192.168.0.1, length 28
12:26:34.773611 ARP, Request who-has 8.8.4.4 tell 192.168.0.1, length 28
12:26:34.773693 ARP, Request who-has 8.8.8.8 tell 192.168.0.1, length 28
12:26:35.773246 ARP, Request who-has 8.8.4.4 tell 192.168.0.1, length 28
12:26:35.773282 ARP, Request who-has 8.8.8.8 tell 192.168.0.1, length 28
12:26:36.773177 ARP, Request who-has 8.8.8.8 tell 192.168.0.1, length 28
12:26:36.773214 ARP, Request who-has 8.8.4.4 tell 192.168.0.1, length 28
12:26:39.778860 ARP, Request who-has 8.8.4.4 tell 192.168.0.1, length 28
12:26:39.778944 ARP, Request who-has 8.8.8.8 tell 192.168.0.1, length 28
12:26:40.777153 ARP, Request who-has 8.8.4.4 tell 192.168.0.1, length 28
12:26:40.777190 ARP, Request who-has 8.8.8.8 tell 192.168.0.1, length 28
12:26:41.777150 ARP, Request who-has 8.8.8.8 tell 192.168.0.1, length 28
12:26:41.777189 ARP, Request who-has 8.8.4.4 tell 192.168.0.1, length 28
12:26:44.785519 ARP, Request who-has 8.8.4.4 tell 192.168.0.1, length 28
12:26:44.785603 ARP, Request who-has 8.8.8.8 tell 192.168.0.1, length 28
12:26:54.796188 ARP, Request who-has 8.8.4.4 tell 192.168.0.1, length 28
12:26:54.796270 ARP, Request who-has 8.8.8.8 tell 192.168.0.1, length 28
12:26:55.793161 ARP, Request who-has 8.8.4.4 tell 192.168.0.1, length 28
12:26:55.793198 ARP, Request who-has 8.8.8.8 tell 192.168.0.1, length 28
12:26:56.793146 ARP, Request who-has 8.8.8.8 tell 192.168.0.1, length 28
12:26:56.793183 ARP, Request who-has 8.8.4.4 tell 192.168.0.1, length 28
12:26:57.135129 EAP packet (0) v2, len 48
12:26:57.135472 EAP packet (0) v2, len 31
12:26:57.145942 EAP packet (0) v2, len 6
12:26:57.147386 EAP packet (0) v2, len 199
12:26:57.160906 EAP packet (0) v2, len 1024
12:26:57.161148 EAP packet (0) v2, len 6
12:26:57.171186 EAP packet (0) v2, len 1024
12:26:57.171385 EAP packet (0) v2, len 6
12:26:57.181277 EAP packet (0) v2, len 1024
12:26:57.181480 EAP packet (0) v2, len 6
12:26:57.192997 EAP packet (0) v2, len 1024
12:26:57.193250 EAP packet (0) v2, len 6
12:26:57.203442 EAP packet (0) v2, len 1024
12:26:57.203690 EAP packet (0) v2, len 6
12:26:57.214876 EAP packet (0) v2, len 461
12:26:57.228167 EAP packet (0) v2, len 140
12:26:57.238101 EAP packet (0) v2, len 69
12:26:57.239395 EAP packet (0) v2, len 144
12:26:57.309948 EAP packet (0) v2, len 4
12:26:57.310261 EAPOL key (3) v2, len 117
12:26:57.314455 EAPOL key (3) v2, len 117
12:26:57.316151 EAPOL key (3) v2, len 151
12:26:57.316485 EAPOL key (3) v2, len 95
12:26:57.379388 IP XXX.152.54.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:57.388661 IP XXX.154.22.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:57.399016 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:57.399503 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:57.451376 IP XXX.155.155.40696 > 224.0.0.251.mdns: 0 PTR (QU)?
_spotify-connect._tcp.local. (45)
12:26:57.471217 IP XXX.154.17.17500 > 255.255.255.255.17500: UDP, length 133
12:26:57.485560 IP XXX.153.10.59665 > XXX.155.255.netbios-ns: NBT UDP
PACKET(137): QUERY; REQUEST; BROADCAST
12:26:57.485854 IP XXX.154.17.17500 > 255.255.255.255.17500: UDP, length 133
12:26:57.486183 IP XXX.154.17.17500 > XXX.155.255.17500: UDP, length 133
12:26:57.486445 IP XXX.154.17.17500 > 255.255.255.255.17500: UDP, length 133
12:26:57.500168 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:57.500798 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:57.544353 IP XXX.152.76.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:57.601053 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:57.602507 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:57.638792 IP XXX.152.162.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:26:57.639275 IP XXX.152.162.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:26:57.639406 IP XXX.152.162.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:26:57.639634 IP XXX.152.162.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:26:57.639922 IP XXX.152.162.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:26:57.640319 IP XXX.152.162.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:26:57.640513 IP XXX.152.162.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:57.703023 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:57.703557 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:57.721661 IP XXX.154.131.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:57.790212 IP XXX.152.187.mdns > 224.0.0.251.mdns: 0 AAAA (QU)?
Annikas-MacBook-Air.local. (43)
12:26:57.790307 IP6 XXX::8638:35ff:fe48:45ce.mdns > ff02::fb.mdns: 0
AAAA (QU)? Annikas-MacBook-Air.local. (43)
12:26:57.804323 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:57.804874 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:57.836415 IP6 XXX::a893:8e22:4c7b:f806.59451 > ff02::1:3.hostmon:
UDP, length 23
12:26:57.836812 IP XXX.153.70.59451 > 224.0.0.252.hostmon: UDP, length 23
12:26:57.905070 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:57.905364 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:57.912283 IP6 XXX::b1be:84f5:1653:3b6b.49965 > ff02::1:3.hostmon:
UDP, length 23
12:26:57.912533 IP XXX.154.52.49965 > 224.0.0.252.hostmon: UDP, length 23
12:26:57.913374 IP6 XXX::b1be:84f5:1653:3b6b.58178 > ff02::1:3.hostmon:
UDP, length 23
12:26:57.913704 IP XXX.154.52.58178 > 224.0.0.252.hostmon: UDP, length 23
12:26:57.942229 ARP, Request who-has 8.8.4.4 tell 192.168.0.1, length 28
12:26:57.942356 ARP, Request who-has 8.8.8.8 tell 192.168.0.1, length 28
12:26:57.944002 IP XXX.154.52.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:57.958448 IP XXX.152.163.mdns > 224.0.0.251.mdns: 0 [1a] [1au] PTR
(QM)? _sleep-proxy._udp.local. (117)
12:26:57.959078 IP6 XXX::1c5c:6290:4199:baae.mdns > ff02::fb.mdns: 0
[1a] [1au] PTR (QM)? _sleep-proxy._udp.local. (117)
12:26:57.959246 IP XXX.152.187.mdns > 224.0.0.251.mdns: 0*- [0q] 1/0/2
(Cache flush) AAAA XXX::8638:35ff:fe48:45ce (101)
12:26:57.959346 IP6 XXX::8638:35ff:fe48:45ce.mdns > ff02::fb.mdns: 0*-
[0q] 1/0/2 (Cache flush) AAAA XXX::8638:35ff:fe48:45ce (101)
12:26:58.006091 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:58.006380 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:58.107023 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:58.107806 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:58.132770 IP XXX.153.253.mdns > 224.0.0.251.mdns: 0 A (QU)?
Anas-MacBook-Pro.local. (40)
12:26:58.133253 IP6 XXX::4a2:d7f1:89b7:8808.mdns > ff02::fb.mdns: 0 A
(QU)? Anas-MacBook-Pro.local. (40)
12:26:58.138663 IP XXX.154.22.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:58.146688 IP XXX.152.54.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:58.177525 IP XXX.153.10.59665 > XXX.155.255.netbios-ns: NBT UDP
PACKET(137): QUERY; REQUEST; BROADCAST
12:26:58.186202 IP XXX.152.162.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:58.208262 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:58.208680 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:58.214145 IP XXX.152.187.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:58.247677 IP6 XXX::a893:8e22:4c7b:f806.59451 > ff02::1:3.hostmon:
UDP, length 23
12:26:58.248825 IP XXX.153.70.59451 > 224.0.0.252.hostmon: UDP, length 23
12:26:58.284948 IP XXX.154.243.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:58.285060 IP XXX.154.243.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:58.292940 IP XXX.152.76.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:58.303238 IP XXX.152.1.17500 > XXX.155.255.17500: UDP, length 162
12:26:58.309071 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:58.309648 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:58.323773 IP6 XXX::b1be:84f5:1653:3b6b.49965 > ff02::1:3.hostmon:
UDP, length 23
12:26:58.323827 IP XXX.154.52.49965 > 224.0.0.252.hostmon: UDP, length 23
12:26:58.324615 IP6 XXX::b1be:84f5:1653:3b6b.58178 > ff02::1:3.hostmon:
UDP, length 23
12:26:58.324881 IP XXX.154.52.58178 > 224.0.0.252.hostmon: UDP, length 23
12:26:58.383060 IP XXX.152.187.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:26:58.383521 IP XXX.152.187.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:26:58.384201 IP XXX.152.187.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:26:58.384464 IP XXX.152.187.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:26:58.385174 IP XXX.152.187.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:26:58.385656 IP XXX.152.187.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:26:58.387692 IP6 XXX::c50:7bfd:f2e3:be0d.mdns > ff02::fb.mdns: 0 PTR
(QM)? _googlecast._tcp.local. (40)
12:26:58.387889 IP XXX.154.199.mdns > 224.0.0.251.mdns: 0 PTR (QM)?
_googlecast._tcp.local. (40)
12:26:58.410037 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:58.410686 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:58.475928 IP XXX.152.187.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:58.511038 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:58.511652 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:58.554223 IP XXX.154.199.mdns > 224.0.0.251.mdns: 0 PTR (QU)?
_privet._tcp.local. (36)
12:26:58.554657 IP6 XXX::c50:7bfd:f2e3:be0d.mdns > ff02::fb.mdns: 0 PTR
(QU)? _privet._tcp.local. (36)
12:26:58.612248 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:58.612523 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:58.659774 IP6 XXX::a893:8e22:4c7b:f806.62493 > ff02::1:3.hostmon:
UDP, length 23
12:26:58.660203 IP XXX.153.70.62493 > 224.0.0.252.hostmon: UDP, length 23
12:26:58.685249 IP XXX.154.52.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:58.723575 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:58.724251 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:58.772997 IP XXX.153.147.mdns > 224.0.0.251.mdns: 0 [2q] PTR (QM)?
_233637DE._sub._googlecast._tcp.local. PTR (QM)? _googlecast._tcp.local.
(61)
12:26:58.822941 IP XXX.154.246.mdns > 224.0.0.251.mdns: 0 AAAA (QU)?
Marks-MacBook-Pro.local. (41)
12:26:58.823237 IP6 XXX::7ed1:c3ff:fe6c:668a.mdns > ff02::fb.mdns: 0
AAAA (QU)? Marks-MacBook-Pro.local. (41)
12:26:58.825287 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:58.825595 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:58.835464 IP XXX.153.60.17500 > 255.255.255.255.17500: UDP, length 364
12:26:58.835717 IP XXX.153.60.17500 > XXX.155.255.17500: UDP, length 364
12:26:58.835983 IP XXX.153.60.17500 > 255.255.255.255.17500: UDP, length 378
12:26:58.836621 IP XXX.153.60.17500 > XXX.155.255.17500: UDP, length 378
12:26:58.850722 IP XXX.154.17.59728 > 255.255.255.255.8612: UDP, length 16
12:26:58.851086 IP XXX.154.17.59728 > 255.255.255.255.8612: UDP, length 16
12:26:58.894684 IP XXX.152.54.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:58.926079 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:58.926576 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:58.941135 ARP, Request who-has 8.8.8.8 tell 192.168.0.1, length 28
12:26:58.941173 ARP, Request who-has 8.8.4.4 tell 192.168.0.1, length 28
12:26:58.957939 IP6 XXX::1086:49e1:827c:9b9f.mdns > ff02::fb.mdns: 0 A
(QM)? Ainhoas-MacBook-Air.local. (43)
12:26:58.958133 IP XXX.155.142.mdns > 224.0.0.251.mdns: 0 A (QM)?
Ainhoas-MacBook-Air.local. (43)
12:26:58.961173 ARP, Reply XXX.155.169 is-at d0:e1:40:32:30:c4 (oui
Unknown), length 28
12:26:58.974306 IP XXX.154.65.17500 > 255.255.255.255.17500: UDP, length 157
12:26:58.977853 IP XXX.154.65.17500 > XXX.155.255.17500: UDP, length 157
12:26:58.977956 IP XXX.154.65.17500 > 255.255.255.255.17500: UDP, length 157
12:26:59.027139 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:59.027723 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:59.067782 IP XXX.154.44.mdns > 224.0.0.251.mdns: 0 A (QM)?
Daniels-MacBook-Air.local. (43)
12:26:59.068001 IP6 XXX::1cd2:5ec0:917c:2be1.mdns > ff02::fb.mdns: 0 A
(QM)? Daniels-MacBook-Air.local. (43)
12:26:59.070752 IP6 XXX::a893:8e22:4c7b:f806.62493 > ff02::1:3.hostmon:
UDP, length 23
12:26:59.070967 IP XXX.153.70.62493 > 224.0.0.252.hostmon: UDP, length 23
12:26:59.086453 IP XXX.155.193.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:59.128166 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:59.128267 IP XXX.154.246.mdns > 224.0.0.251.mdns: 0*- [0q] 1/0/2
(Cache flush) AAAA XXX::7ed1:c3ff:fe6c:668a (99)
12:26:59.128634 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:59.128770 IP6 XXX::7ed1:c3ff:fe6c:668a.mdns > ff02::fb.mdns: 0*-
[0q] 1/0/2 (Cache flush) AAAA XXX::7ed1:c3ff:fe6c:668a (99)
12:26:59.150450 IP XXX.152.187.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:59.188480 IP XXX.154.246.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:59.188582 IP XXX.153.253.mdns > 224.0.0.251.mdns: 0 A (QM)?
Anas-MacBook-Pro.local. (40)
12:26:59.189111 IP6 XXX::4a2:d7f1:89b7:8808.mdns > ff02::fb.mdns: 0 A
(QM)? Anas-MacBook-Pro.local. (40)
12:26:59.229208 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:59.229808 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:59.330104 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:59.330600 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:59.334222 IP XXX.154.243.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:59.357510 IP XXX.153.67.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:59.431105 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:59.431661 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:59.435424 IP XXX.154.52.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:59.436339 IP XXX.154.243.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:59.436615 IP XXX.154.243.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:26:59.436826 IP XXX.154.243.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:26:59.437022 IP XXX.154.243.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:26:59.437193 IP XXX.154.243.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:26:59.437505 IP XXX.154.243.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:26:59.437599 IP XXX.154.243.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:26:59.455841 IP XXX.154.199.mdns > 224.0.0.251.mdns: 0 PTR (QM)?
_privet._tcp.local. (36)
12:26:59.456062 IP6 XXX::c50:7bfd:f2e3:be0d.mdns > ff02::fb.mdns: 0 PTR
(QM)? _privet._tcp.local. (36)
12:26:59.519441 IP XXX.154.243.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:26:59.532194 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:59.532661 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:59.660920 IP XXX.154.44.mdns > 224.0.0.251.mdns: 0 AAAA (QU)?
Daniels-MacBook-Air.local. (43)
12:26:59.661017 IP6 XXX::1cd2:5ec0:917c:2be1.mdns > ff02::fb.mdns: 0
AAAA (QU)? Daniels-MacBook-Air.local. (43)
12:26:59.662808 IP XXX.154.246.51308 > XXX.155.255.8612: UDP, length 16
12:26:59.663132 IP XXX.154.246.52260 > 224.0.0.1.8612: UDP, length 16
12:26:59.671120 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:59.671507 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:59.690265 IP XXX.155.142.mdns > 224.0.0.251.mdns: 0 AAAA (QU)?
Ainhoas-MacBook-Air.local. (43)
12:26:59.690815 IP6 XXX::1086:49e1:827c:9b9f.mdns > ff02::fb.mdns: 0
AAAA (QU)? Ainhoas-MacBook-Air.local. (43)
12:26:59.772155 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:59.772634 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:59.873839 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:59.873986 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:26:59.934352 IP XXX.153.10.62012 > XXX.155.255.netbios-ns: NBT UDP
PACKET(137): QUERY; REQUEST; BROADCAST
12:26:59.941204 ARP, Request who-has 8.8.4.4 tell 192.168.0.1, length 28
12:26:59.941243 ARP, Request who-has 8.8.8.8 tell 192.168.0.1, length 28
12:26:59.974428 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:26:59.974562 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:00.020368 IP XXX.154.243.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:00.075207 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:00.075484 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:00.106917 IP XXX.154.175.mdns > 224.0.0.251.mdns: 0 AAAA (QU)?
Celinas-MacBook-Air.local. (43)
12:27:00.107011 IP6 XXX::5ef9:38ff:fe8f:29c4.mdns > ff02::fb.mdns: 0
AAAA (QU)? Celinas-MacBook-Air.local. (43)
12:27:00.176245 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:00.176640 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:00.205953 IP6 XXX::b1be:84f5:1653:3b6b.60233 > ff02::1:3.hostmon:
UDP, length 23
12:27:00.206004 IP XXX.154.52.60233 > 224.0.0.252.hostmon: UDP, length 23
12:27:00.206852 IP6 XXX::b1be:84f5:1653:3b6b.54524 > ff02::1:3.hostmon:
UDP, length 23
12:27:00.207015 IP XXX.154.52.54524 > 224.0.0.252.hostmon: UDP, length 23
12:27:00.227202 IP XXX.154.52.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:00.244839 IP XXX.152.58.mdns > 224.0.0.251.mdns: 0 [1a] PTR (QM)?
_sleep-proxy._udp.local. (88)
12:27:00.245346 IP6 XXX::18a6:4ddc:9d33:313e.mdns > ff02::fb.mdns: 0
[1a] PTR (QM)? _sleep-proxy._udp.local. (88)
12:27:00.252361 IP XXX.154.175.mdns > 224.0.0.251.mdns: 0*- [0q] 1/0/2
(Cache flush) AAAA XXX::5ef9:38ff:fe8f:29c4 (101)
12:27:00.252637 IP6 XXX::5ef9:38ff:fe8f:29c4.mdns > ff02::fb.mdns: 0*-
[0q] 1/0/2 (Cache flush) AAAA XXX::5ef9:38ff:fe8f:29c4 (101)
12:27:00.259235 IP XXX.152.199.mdns > 224.0.0.251.mdns: 0 [2q] PTR (QM)?
_805741C9._sub._googlecast._tcp.local. PTR (QM)? _googlecast._tcp.local.
(61)
12:27:00.263554 IP XXX.154.86.57621 > 255.255.255.255.57621: UDP, length 40
12:27:00.277559 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:00.278004 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:00.330460 fa:5a:c2:ab:32:28 (oui Unknown) > 64:d9:89:90:67:2d (oui
Unknown), ethertype Unknown (0x88c7), length 18:
0x0000: 0201 0000 ....
12:27:00.378411 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:00.378762 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:00.421497 IP XXX.153.67.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:00.421990 IP XXX.153.67.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:00.447380 IP XXX.153.67.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:00.466366 ARP, Reply XXX.154.169 is-at e0:63:e5:75:53:fb (oui
Unknown), length 28
12:27:00.477750 IP XXX.153.67.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:00.478178 IP XXX.153.67.netbios-dgm > XXX.155.255.netbios-dgm: NBT
UDP PACKET(138)
12:27:00.478442 IP XXX.153.67.netbios-dgm > XXX.155.255.netbios-dgm: NBT
UDP PACKET(138)
12:27:00.478749 IP XXX.153.67.netbios-dgm > XXX.155.255.netbios-dgm: NBT
UDP PACKET(138)
12:27:00.478964 IP XXX.153.67.netbios-dgm > XXX.155.255.netbios-dgm: NBT
UDP PACKET(138)
12:27:00.479238 IP XXX.153.67.netbios-dgm > XXX.155.255.netbios-dgm: NBT
UDP PACKET(138)
12:27:00.479343 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:00.479759 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:00.562936 IP XXX.153.67.netbios-dgm > XXX.155.255.netbios-dgm: NBT
UDP PACKET(138)
12:27:00.580200 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:00.580681 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:00.598635 IP XXX.154.175.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:27:00.598740 IP XXX.154.175.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:27:00.598991 IP XXX.154.175.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:27:00.599226 IP XXX.154.175.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:27:00.599503 IP XXX.154.175.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:27:00.600171 IP XXX.154.175.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:00.600528 IP XXX.154.175.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:27:00.616132 IP6 XXX::b1be:84f5:1653:3b6b.60233 > ff02::1:3.hostmon:
UDP, length 23
12:27:00.616238 IP XXX.154.52.60233 > 224.0.0.252.hostmon: UDP, length 23
12:27:00.616916 IP6 XXX::b1be:84f5:1653:3b6b.54524 > ff02::1:3.hostmon:
UDP, length 23
12:27:00.617021 IP XXX.154.52.54524 > 224.0.0.252.hostmon: UDP, length 23
12:27:00.634247 IP XXX.153.10.62012 > XXX.155.255.netbios-ns: NBT UDP
PACKET(137): QUERY; REQUEST; BROADCAST
12:27:00.673068 IP XXX.153.67.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:00.674354 IP XXX.154.44.mdns > 224.0.0.251.mdns: 0 AAAA (QM)?
Daniels-MacBook-Air.local. (43)
12:27:00.674482 IP6 XXX::1cd2:5ec0:917c:2be1.mdns > ff02::fb.mdns: 0
AAAA (QM)? Daniels-MacBook-Air.local. (43)
12:27:00.681339 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:00.681890 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:00.692791 IP XXX.155.142.mdns > 224.0.0.251.mdns: 0 AAAA (QM)?
Ainhoas-MacBook-Air.local. (43)
12:27:00.693236 IP6 XXX::1086:49e1:827c:9b9f.mdns > ff02::fb.mdns: 0
AAAA (QM)? Ainhoas-MacBook-Air.local. (43)
12:27:00.708056 IP XXX.154.243.17500 > 255.255.255.255.17500: UDP,
length 237
12:27:00.708310 IP XXX.154.243.17500 > XXX.155.255.17500: UDP, length 237
12:27:00.725478 IP XXX.152.34.mdns > 224.0.0.251.mdns: 0 [2q] PTR (QM)?
_233637DE._sub._googlecast._tcp.local. PTR (QM)? _googlecast._tcp.local.
(61)
12:27:00.744156 IP XXX.154.131.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:00.782449 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:00.783058 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:00.883313 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:00.883605 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:00.913656 IP XXX.154.251.17500 > XXX.155.255.17500: UDP, length 144
12:27:00.977926 IP XXX.154.52.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:00.984308 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:00.984624 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:00.987709 IP XXX.154.175.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:00.989683 IP XXX.152.175.17500 > XXX.155.255.17500: UDP, length 379
12:27:01.085453 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:01.086233 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:01.186513 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:01.187059 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:01.251567 IP XXX.155.106.17500 > 255.255.255.255.17500: UDP,
length 278
12:27:01.251969 IP XXX.155.106.17500 > XXX.155.255.17500: UDP, length 278
12:27:01.287376 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:01.287926 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:01.341478 IP XXX.153.10.51613 > XXX.155.255.netbios-ns: NBT UDP
PACKET(137): QUERY; REQUEST; BROADCAST
12:27:01.351515 IP XXX.153.67.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:01.388286 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:01.388730 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:01.489312 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:01.489841 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:01.574201 IP XXX.154.156.17500 > 255.255.255.255.17500: UDP,
length 247
12:27:01.574436 IP XXX.154.156.17500 > XXX.155.255.17500: UDP, length 247
12:27:01.590423 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:01.590886 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:01.691384 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:01.691745 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:01.728671 IP XXX.154.52.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:01.792606 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:01.793105 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:01.813149 IP XXX.154.84.17500 > 255.255.255.255.17500: UDP, length 279
12:27:01.813351 IP XXX.154.84.17500 > XXX.155.255.17500: UDP, length 279
12:27:01.822721 IP XXX.154.175.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:01.830504 IP XXX.154.10.17500 > 255.255.255.255.17500: UDP, length 168
12:27:01.834295 IP XXX.154.10.17500 > 255.255.255.255.17500: UDP, length 168
12:27:01.834562 IP XXX.154.10.17500 > 255.255.255.255.17500: UDP, length 168
12:27:01.835142 IP XXX.154.10.17500 > XXX.155.255.17500: UDP, length 168
12:27:01.835426 IP XXX.154.10.17500 > 255.255.255.255.17500: UDP, length 168
12:27:01.835524 IP XXX.154.10.17500 > 255.255.255.255.17500: UDP, length 168
12:27:01.890359 IP XXX.153.10.51613 > XXX.155.255.netbios-ns: NBT UDP
PACKET(137): QUERY; REQUEST; BROADCAST
12:27:01.916941 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:01.917555 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:01.928056 IP XXX.154.175.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:27:02.018417 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:02.018950 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:02.119413 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:02.119884 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:02.143115 IP XXX.155.193.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:02.143217 IP XXX.155.193.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:02.175467 ARP, Request who-has 8.8.4.4 tell 192.168.0.1, length 28
12:27:02.175587 ARP, Request who-has 8.8.8.8 tell 192.168.0.1, length 28
12:27:02.195657 IP XXX.153.253.mdns > 224.0.0.251.mdns: 0 A (QM)?
Anas-MacBook-Pro.local. (40)
12:27:02.195947 IP6 XXX::4a2:d7f1:89b7:8808.mdns > ff02::fb.mdns: 0 A
(QM)? Anas-MacBook-Pro.local. (40)
12:27:02.215166 IP XXX.154.246.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:02.220858 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:02.221364 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:02.248838 IP XXX.155.193.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:02.256553 IP XXX.155.3.17500 > 255.255.255.255.17500: UDP, length 332
12:27:02.256985 IP XXX.155.3.17500 > XXX.155.255.17500: UDP, length 332
12:27:02.321432 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:02.322050 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:02.358589 IP XXX.155.193.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:02.359036 IP XXX.155.193.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:27:02.359110 IP XXX.155.193.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:27:02.359346 IP XXX.155.193.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:27:02.359477 IP XXX.155.193.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:27:02.359790 IP XXX.155.193.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:27:02.377695 IP XXX.153.178.mdns > 224.0.0.251.mdns: 0 [2q] PTR (QM)?
_37F83649._sub._googlecast._tcp.local. PTR (QM)? _googlecast._tcp.local.
(61)
12:27:02.422409 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:02.422960 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:02.439711 IP XXX.155.193.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:02.443187 IP XXX.155.193.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:27:02.520551 IP XXX.154.199.mdns > 224.0.0.251.mdns: 0 PTR (QM)?
_privet._tcp.local. (36)
12:27:02.520993 IP6 XXX::c50:7bfd:f2e3:be0d.mdns > ff02::fb.mdns: 0 PTR
(QM)? _privet._tcp.local. (36)
12:27:02.523393 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:02.523870 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:02.591391 IP XXX.153.10.64641 > XXX.155.255.netbios-ns: NBT UDP
PACKET(137): QUERY; REQUEST; BROADCAST
12:27:02.624506 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:02.624971 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:02.725395 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:02.725886 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:02.826489 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:02.826873 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:02.927526 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:02.927787 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:03.028434 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:03.028716 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:03.120026 IP6 XXX::a893:8e22:4c7b:f806.51315 > ff02::1:3.hostmon:
UDP, length 22
12:27:03.120051 IP XXX.153.70.51315 > 224.0.0.252.hostmon: UDP, length 22
12:27:03.141626 IP XXX.153.253.mdns > 224.0.0.251.mdns: 0 AAAA (QU)?
Anas-MacBook-Pro.local. (40)
12:27:03.142093 IP6 XXX::4a2:d7f1:89b7:8808.mdns > ff02::fb.mdns: 0 AAAA
(QU)? Anas-MacBook-Pro.local. (40)
12:27:03.145170 IP XXX.153.70.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:03.148734 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:03.149489 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:03.173095 ARP, Request who-has 8.8.8.8 tell 192.168.0.1, length 28
12:27:03.173132 ARP, Request who-has 8.8.4.4 tell 192.168.0.1, length 28
12:27:03.199812 IP XXX.152.188.mdns > 224.0.0.251.mdns: 0 [2q] PTR (QM)?
_233637DE._sub._googlecast._tcp.local. PTR (QM)? _googlecast._tcp.local.
(61)
12:27:03.248328 IP XXX.155.193.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:03.249791 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:03.250397 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:03.279909 IP XXX.153.10.64641 > XXX.155.255.netbios-ns: NBT UDP
PACKET(137): QUERY; REQUEST; BROADCAST
12:27:03.350573 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:03.351092 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:03.376063 IP XXX.152.15.17500 > 255.255.255.255.17500: UDP, length 168
12:27:03.384042 IP XXX.152.15.17500 > 255.255.255.255.17500: UDP, length 168
12:27:03.384462 IP XXX.152.15.17500 > 255.255.255.255.17500: UDP, length 168
12:27:03.384750 IP XXX.152.15.17500 > XXX.155.255.17500: UDP, length 168
12:27:03.451447 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:03.451989 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:03.531911 IP6 XXX::a893:8e22:4c7b:f806.51315 > ff02::1:3.hostmon:
UDP, length 22
12:27:03.532116 IP XXX.153.70.51315 > 224.0.0.252.hostmon: UDP, length 22
12:27:03.544216 IP XXX.152.5.60106 > XXX.155.255.netbios-ns: NBT UDP
PACKET(137): QUERY; REQUEST; BROADCAST
12:27:03.552470 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:03.553173 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:03.634923 IP XXX.152.5.netbios-dgm > XXX.155.255.netbios-dgm: NBT
UDP PACKET(138)
12:27:03.653565 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:03.654157 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:03.695123 IP XXX.154.44.mdns > 224.0.0.251.mdns: 0 AAAA (QM)?
Daniels-MacBook-Air.local. (43)
12:27:03.695354 IP6 XXX::1cd2:5ec0:917c:2be1.mdns > ff02::fb.mdns: 0
AAAA (QM)? Daniels-MacBook-Air.local. (43)
12:27:03.703680 IP XXX.155.142.mdns > 224.0.0.251.mdns: 0 AAAA (QM)?
Ainhoas-MacBook-Air.local. (43)
12:27:03.703944 IP6 XXX::1086:49e1:827c:9b9f.mdns > ff02::fb.mdns: 0
AAAA (QM)? Ainhoas-MacBook-Air.local. (43)
12:27:03.754685 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:03.755158 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:03.773938 IP XXX.154.131.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:03.774212 IP XXX.154.131.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:03.855609 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:03.855898 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:03.892692 IP XXX.153.70.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:03.956565 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:03.957051 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:03.990067 IP XXX.153.10.63617 > XXX.155.255.netbios-ns: NBT UDP
PACKET(137): QUERY; REQUEST; BROADCAST
12:27:04.057669 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:04.058105 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:04.146255 IP XXX.153.253.mdns > 224.0.0.251.mdns: 0 AAAA (QM)?
Anas-MacBook-Pro.local. (40)
12:27:04.147053 IP6 XXX::4a2:d7f1:89b7:8808.mdns > ff02::fb.mdns: 0 AAAA
(QM)? Anas-MacBook-Pro.local. (40)
12:27:04.158717 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:04.159106 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:04.173101 ARP, Request who-has 8.8.4.4 tell 192.168.0.1, length 28
12:27:04.173137 ARP, Request who-has 8.8.8.8 tell 192.168.0.1, length 28
12:27:04.260836 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:04.276847 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:04.366486 IP XXX.154.142.51059 > XXX.155.255.8612: UDP, length 16
12:27:04.366590 IP XXX.154.142.51553 > 224.0.0.1.8612: UDP, length 16
12:27:04.377650 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:04.378141 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:04.431892 IP XXX.154.131.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:04.478586 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:04.479276 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:04.528837 IP XXX.155.229.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:04.579579 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:04.580235 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:04.644394 IP XXX.153.70.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:04.665510 IP XXX.154.131.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:04.665983 IP XXX.154.131.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:27:04.666321 IP XXX.154.131.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:27:04.666590 IP XXX.154.131.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:27:04.667284 IP XXX.154.131.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:27:04.667619 IP XXX.154.131.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:27:04.668272 IP XXX.154.131.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:04.680657 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:04.681123 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:04.685921 IP XXX.153.10.63617 > XXX.155.255.netbios-ns: NBT UDP
PACKET(137): QUERY; REQUEST; BROADCAST
12:27:04.738404 IP XXX.155.142.mdns > 224.0.0.251.mdns: 0 A (QU)?
Ainhoas-MacBook-Air.local. (43)
12:27:04.738725 IP6 XXX::1086:49e1:827c:9b9f.mdns > ff02::fb.mdns: 0 A
(QU)? Ainhoas-MacBook-Air.local. (43)
12:27:04.739261 IP XXX.152.5.netbios-dgm > XXX.155.255.netbios-dgm: NBT
UDP PACKET(138)
12:27:04.742093 IP XXX.154.131.netbios-dgm > XXX.155.255.netbios-dgm:
NBT UDP PACKET(138)
12:27:04.774629 IP XXX.155.200.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:04.781612 IP XXX.154.88.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:04.781687 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:04.782927 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:04.794999 IP XXX.154.44.mdns > 224.0.0.251.mdns: 0 A (QU)?
Daniels-MacBook-Air.local. (43)
12:27:04.795225 IP6 XXX::1cd2:5ec0:917c:2be1.mdns > ff02::fb.mdns: 0 A
(QU)? Daniels-MacBook-Air.local. (43)
12:27:04.841937 IP XXX.155.229.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:04.866546 IP XXX.152.157.netbios-ns > XXX.155.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
12:27:04.883605 IP XXX.155.65.2008 > XXX.155.255.2008: UDP, length 14
12:27:04.884069 IP XXX.155.65.2007 > XXX.155.255.2007: UDP, length 14
12:27:04.934680 IP 10.11.31.14 > 224.0.0.1: igmp query v2
tcpdump: pcap_loop: The interface went down
452 packets captured
8348 packets received by filter
7896 packets dropped by kernel#
It may also be worth mentioning that I had to blacklist ath3k to prevent
the kernel from finding an inexistent bluetooth device and an error that
often appears after some reconnects by wpa_supplicant is:
wlan0: RSN: failed to get master session key from pre-auth EAPOL state
machines
wlan0: RSN: pre-authentication with XXX failed
wlan0: RSN: failed to get master session key from pre-auth EAPOL state
machines
wlan0: RSN: pre-authentication with XXX failed
wlan0: RSN: failed to get master session key from pre-auth EAPOL state
machines
wlan0: RSN: pre-authentication with XXX failed
wlan0: RSN: failed to get master session key from pre-auth EAPOL state
machines
wlan0: RSN: pre-authentication with XXX failed
On 14.11.2016 08:56, Michal Kazior wrote:
> On 11 November 2016 at 13:07, Felix <kramerfe@gmail.com> wrote:
>> Hello,
>>
>> I am running a Debian Jessie server on the backports kernel
>> 4.7.0-0.bpo.1-amd64. An Ubiquiti SR71 with its AR928X is working just fine
>> under ath9k.
>>
>> The mikrotik R11e-5HacT with its QCA9880-BR4A is recognized after some
>> errors trying to load inexistent files with the standard firmware-5.bin from
>> the Jessie Backports (10.2.4.70.54):
>> ...ath10k_pci 0000:02:00.0: firmware: failed to load
>> ath10k/pre-cal-pci-0000:02:00.0.bin (-2)
>> ...ath10k_pci 0000:02:00.0: Direct firmware load for
>> ath10k/pre-cal-pci-0000:02:00.0.bin failed with error -2
>> ...ath10k_pci 0000:02:00.0: firmware: failed to load
>> ath10k/cal-pci-0000:02:00.0.bin (-2)
>> ...ath10k_pci 0000:02:00.0: Direct firmware load for
>> ath10k/cal-pci-0000:02:00.0.bin failed with error -2
>> ...ath10k_pci 0000:02:00.0: firmware: failed to load
>> ath10k/QCA988X/hw2.0/board-2.bin (-2)
>> ...ath10k_pci 0000:02:00.0: Direct firmware load for
>> ath10k/QCA988X/hw2.0/board-2.bin failed with error -2
>> There are many reports on working devices with these errors on the web so I
>> suppose they can be ignored.
> Correct. These are just overly verbose messages from the kernel as
> ath10k probes latest-to-oldest firmware files in fallback fashion.
>
>
>> The device seems to work (iw scan shows better results than the SR71), but
>> after connection to the AP via wpa_supplicant, dhclient is unable to
>> retrieve an IP-adress.
> Did you check tcpdump on the interface to see if it is getting any
> traffic? Did you try ping6 ff02::1%wlanX ? Are you using WPA, WEP,
> 8021X? VLANs? 4addr mode?
>
>
>> I have tried the newer firmware (10.2.4.70.58) and
>> the older ones as well as those from candela without success. On older
>> firmwares additional errors up to firmware crash on iw set bitrates appear.
> Interesting. Are you using multiple interfaces on ath10k? Is the
> interface you're running "set bitrates" on really associated?
>
> What is the AP saying about the client association state? Is it
> running hostapd? Does it receive any traffic from the client
> (tcpdump)?
>
>
> Michał
>
_______________________________________________
ath10k mailing list
ath10k@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/ath10k
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: Connection Problems with on QCA9880-BR4A
2016-11-15 12:59 ` Felix
@ 2016-11-15 13:48 ` Michal Kazior
2016-11-15 22:42 ` Felix
0 siblings, 1 reply; 6+ messages in thread
From: Michal Kazior @ 2016-11-15 13:48 UTC (permalink / raw)
To: Felix; +Cc: ath10k@lists.infradead.org
On 15 November 2016 at 13:59, Felix <kramerfe@gmail.com> wrote:
[...]
>>> cat /etc/wpa_supplicant/wpa_supplicant.conf
> ctrl_interface=/var/run/wpa_supplicant
> network={
> ssid="eduroam"
> proto=RSN
> pairwise=CCMP
> group=CCMP
> key_mgmt=WPA-EAP
> eap=TTLS
> domain_suffix_match="XXX"
> phase1="peaplabel=0"
> anonymous_identity="anonymous@XXX"
> phase2="auth=PAP"
> ca_cert="XXX"
> identity="XXX"
> password="XXX"
> }
>
>>> wpa_supplicant -i wlan0 -D nl80211 -c
>>> /etc/wpa_supplicant/wpa_supplicant.conf
> Successfully initialized wpa_supplicant
> wlan0: SME: Trying to authenticate with XXX (SSID='eduroam' freq=5240 MHz)
> wlan0: Trying to associate with XXX (SSID='eduroam' freq=5240 MHz)
> wlan0: Associated with XXX
> wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
> wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21
> wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected
> wlan0: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=XXX
> wlan0: CTRL-EVENT-EAP-PEER-CERT depth=3 subject='XXX'
> wlan0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='XXX'
> wlan0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='XXX'
> wlan0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='XXX'
> wlan0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
> wlan0: WPA: Key negotiation completed with XXX [PTK=CCMP GTK=CCMP]
> wlan0: CTRL-EVENT-CONNECTED - Connection to XXX completed [id=0 id_str=]
> wlan0: CTRL-EVENT-DISCONNECTED bssid=XXX reason=2
How long is CONNECTED away from DISCONNECTED? Running with "-t" should
add timestamps. At this point I would suggest "-ddd" to get verbose
logs.
>>> cat /etc/dhcp/dhclient.conf
> option rfc3442-classless-static-routes code 121 = array of unsigned integer
> 8;
> supersede dhcp-server-identifier 255.255.255.255;
> request subnet-mask, broadcast-address, time-offset, routers, interface-mtu,
> rfc3442-classless-static-routes;
> timeout 30;
> retry 30;
>
>>> journalctl -b | grep dhclient
> Nov 15 12:32:57 android10278 dhclient[852]: DHCPREQUEST on wlan0 to
> 255.255.255.255 port 67
[...]
>
>>> tcpdump -i wlan0
> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
> listening on wlan0, link-type EN10MB (Ethernet), capture size 262144 bytes
> 12:26:31.765188 ARP, Request who-has 8.8.8.8 tell 192.168.0.1, length 28
> 12:26:31.765227 ARP, Request who-has 8.8.4.4 tell 192.168.0.1, length 28
[...]
> 12:26:57.181480 EAP packet (0) v2, len 6
> 12:26:57.192997 EAP packet (0) v2, len 1024
> 12:26:57.193250 EAP packet (0) v2, len 6
> 12:26:57.203442 EAP packet (0) v2, len 1024
> 12:26:57.203690 EAP packet (0) v2, len 6
> 12:26:57.214876 EAP packet (0) v2, len 461
> 12:26:57.228167 EAP packet (0) v2, len 140
> 12:26:57.238101 EAP packet (0) v2, len 69
> 12:26:57.239395 EAP packet (0) v2, len 144
> 12:26:57.309948 EAP packet (0) v2, len 4
> 12:26:57.310261 EAPOL key (3) v2, len 117
> 12:26:57.314455 EAPOL key (3) v2, len 117
> 12:26:57.316151 EAPOL key (3) v2, len 151
> 12:26:57.316485 EAPOL key (3) v2, len 95
This suggests key exchange has completed.
> 12:26:57.379388 IP XXX.152.54.netbios-ns > XXX.155.255.netbios-ns: NBT UDP
> PACKET(137): QUERY; REQUEST; BROADCAST
> 12:26:57.388661 IP XXX.154.22.netbios-ns > XXX.155.255.netbios-ns: NBT UDP
> PACKET(137): QUERY; REQUEST; BROADCAST
[...]
> 452 packets captured
> 8348 packets received by filter
> 7896 packets dropped by kernel#
What happened to all the packets? Are you really running just
"tcpdump" or are you applying pcap filters that you didn't mention?
There are no DHCP requests so either firmware is refusing to transmit
them OTA, have been filtered by kernel/tcpdump or you have some
firewall rule that drops the packets. Tcpdump does report some traffic
which I infer is just Rx suggesting crypto is (at least partially) set
up. Is there something you're not telling about your setup?
Can you load ath10k_core with debug_mask=0xffffff3f and provide logs?
Michał
_______________________________________________
ath10k mailing list
ath10k@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/ath10k
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: Connection Problems with on QCA9880-BR4A
2016-11-15 13:48 ` Michal Kazior
@ 2016-11-15 22:42 ` Felix
2016-11-18 15:18 ` Michal Kazior
0 siblings, 1 reply; 6+ messages in thread
From: Felix @ 2016-11-15 22:42 UTC (permalink / raw)
To: Michal Kazior; +Cc: ath10k@lists.infradead.org
Hi,
Connected is usually a few minutes away from dsiconnected. I am running
tcpdump without pcap filters. Here are my iptables and udev rules. If I
use the SR71 everything works fine therefore I doubt it has anything to
do with these.
>> cat /etc/network/interfaces
# The loopback network interface
auto lo eth0 wlan0
iface lo inet loopback
# lan with static adress
iface eth0 inet static
address 192.168.0.1
netmask 255.255.255.0
broadcast 192.168.0.255
# The primary wifi network interface
iface wlan0 inet dhcp
wpa-conf /etc/wpa_supplicant/wpa_supplicant.conf
## CONFIGURATION OF IPTABLES
# reset iptables
up /sbin/iptables --flush
up /sbin/iptables --delete-chain
up /sbin/iptables --table nat --flush
# default policy
up /sbin/iptables --policy INPUT DROP
up /sbin/iptables --policy OUTPUT ACCEPT
up /sbin/iptables --policy FORWARD DROP
# allow connections from eth0
up /sbin/iptables --append INPUT --in-interface eth0 --jump ACCEPT
# allow dhcp renewal request from wlan0
up /sbin/iptables --append INPUT --in-interface wlan0 --protocol
udp --dport 67:68 --sport 67:68 --jump ACCEPT
# allow existing connections to continue
up /sbin/iptables --append INPUT --match state --state
RELATED,ESTABLISHED --jump ACCEPT
up /sbin/iptables --append FORWARD --match conntrack --ctstate
RELATED,ESTABLISHED --jump ACCEPT
# allow packets from loopback interface
up /sbin/iptables --append INPUT --in-interface lo --jump ACCEPT
# Port-Forwarding and Nat to tun0
up /sbin/iptables --table nat --append POSTROUTING --out-interface
tun0 --jump MASQUERADE
up /sbin/iptables --append FORWARD --in-interface eth0
--out-interface tun0 --jump ACCEPT
up sysctl -w net.ipv4.ip_forward=1
up service dnsmasq restart
>> cat /etc/udev/rules.d/70-persistent-net.rules
SUBSYSTEM=="net", ACTION=="add", DRIVERS=="?*", ATTR{address}=="XXx",
ATTR{dev_id}=="0x0", ATTR{type}=="1", KERNEL=="eth*", NAME="eth0"
# PCI device 0x168c:0x002a (ath9k)
SUBSYSTEM=="net", ACTION=="add", DRIVERS=="?*", ATTR{address}=="XXX",
ATTR{dev_id}=="0x0", ATTR{type}=="1", KERNEL=="wlan*", NAME="wlan0",
RUN+="/bin/bash /firebox/randomhost", RUN+="/sbin/ifconfig wlan0 down",
RUN+="/usr/bin/macchanger -b -a wlan0", RUN+="/bin/hostname
android$RANDOM", RUN+="/sbin/iw dev wlan0 set power_save off",
RUN+="/sbin/iw phy phy0 set distance 150", RUN+="/sbin/iw phy phy0 set
txpower fixed 2000", RUN+="/sbin/iw phy phy0 set antenna 0x3 0x3",
RUN+="/sbin/ifconfig wlan0 up"
# PCI device 0x168c:0x003c (ath10k_pci)
SUBSYSTEM=="net", ACTION=="add", DRIVERS=="?*", ATTR{address}=="XXX",
ATTR{dev_id}=="0x0", ATTR{type}=="1", KERNEL=="wlan*", NAME="wlan0",
RUN+="/bin/bash /firebox/randomhost", RUN+="/sbin/ifconfig wlan0 down",
RUN+="/usr/bin/macchanger -b -a wlan0", RUN+="/bin/hostname
android$RANDOM", RUN+="/sbin/ifconfig wlan0 up"
The option debug_mask=0xffffff3f does not give me any addidtional
entries in dmesg or journalctl. I also tried "modprobe ath10k_core
debug_mask=0xffffffff" with the same result and shows the debug_mask
value seems properly set:
>> cat /sys/module/ath10k_core/parameters/debug_mask
4294967295
>> python -c 'print "%i" % 0xffffffff'
4294967295
>> wpa_supplicant -t -i wlan0 -D nl80211 -c
/etc/wpa_supplicant/wpa_supplicant.conf -ddd
1479241668.867532: wpa_supplicant v2.3
1479241668.867723: random: Trying to read entropy from /dev/random
1479241668.867787: Successfully initialized wpa_supplicant
1479241668.867817: Initializing interface 'wlan0' conf
'/etc/wpa_supplicant/wpa_supplicant.conf' driver 'nl80211'
ctrl_interface 'N/A' bridge 'N/A'
1479241668.867846: Configuration file
'/etc/wpa_supplicant/wpa_supplicant.conf' ->
'/etc/wpa_supplicant/wpa_supplicant.conf'
1479241668.867882: Reading configuration file
'/etc/wpa_supplicant/wpa_supplicant.conf'
1479241668.868028: ctrl_interface='/var/run/wpa_supplicant'
1479241668.868566: Line: 3 - start of a new network block
1479241668.868595: ssid - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
1479241668.868657: proto: 0x2
1479241668.868706: pairwise: 0x10
1479241668.868742: group: 0x10
1479241668.868770: key_mgmt: 0x1
1479241668.868806: eap methods - hexdump(len=16): 00 00 00 00 15 00 00
00 00 00 00 00 00 00 00 00
1479241668.868870: domain_suffix_match - hexdump_ascii(len=16):
YYY
1479241668.868941: phase1 - hexdump_ascii(len=11):
YYY peaplabel=0
1479241668.868997: anonymous_identity - hexdump_ascii(len=26):
YYY
1479241668.869094: phase2 - hexdump_ascii(len=8):
YYY auth=PAP
1479241668.869161: ca_cert - hexdump_ascii(len=50):
YYYcert
1479241668.869336: identity - hexdump_ascii(len=25):
YYY
1479241668.869430: password - hexdump_ascii(len=9): [REMOVED]
1479241668.869512: Priority group 0
1479241668.869547: id=0 ssid='eduroam'
1479241668.871032: rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
1479241668.871470: nl80211: Supported cipher 00-0f-ac:1
1479241668.871494: nl80211: Supported cipher 00-0f-ac:5
1479241668.871506: nl80211: Supported cipher 00-0f-ac:2
1479241668.871519: nl80211: Supported cipher 00-0f-ac:4
1479241668.871529: nl80211: Supported cipher 00-0f-ac:6
1479241668.871599: nl80211: Using driver-based off-channel TX
1479241668.871652: nl80211: interface wlan0 in phy phy0
1479241668.871723: nl80211: Set mode ifindex 4 iftype 2 (STATION)
1479241668.871800: nl80211: Subscribe to mgmt frames with non-AP handle
0x5577f86e5f30
1479241668.871831: nl80211: Register frame type=0xd0
(WLAN_FC_STYPE_ACTION) nl_handle=0x5577f86e5f30 match=040a
1479241668.871897: nl80211: Register frame type=0xd0
(WLAN_FC_STYPE_ACTION) nl_handle=0x5577f86e5f30 match=040b
1479241668.871962: nl80211: Register frame type=0xd0
(WLAN_FC_STYPE_ACTION) nl_handle=0x5577f86e5f30 match=040c
1479241668.872022: nl80211: Register frame type=0xd0
(WLAN_FC_STYPE_ACTION) nl_handle=0x5577f86e5f30 match=040d
1479241668.872086: nl80211: Register frame type=0xd0
(WLAN_FC_STYPE_ACTION) nl_handle=0x5577f86e5f30 match=090a
1479241668.872146: nl80211: Register frame type=0xd0
(WLAN_FC_STYPE_ACTION) nl_handle=0x5577f86e5f30 match=090b
1479241668.872205: nl80211: Register frame type=0xd0
(WLAN_FC_STYPE_ACTION) nl_handle=0x5577f86e5f30 match=090c
1479241668.872268: nl80211: Register frame type=0xd0
(WLAN_FC_STYPE_ACTION) nl_handle=0x5577f86e5f30 match=090d
1479241668.872335: nl80211: Register frame type=0xd0
(WLAN_FC_STYPE_ACTION) nl_handle=0x5577f86e5f30 match=0409506f9a09
1479241668.872396: nl80211: Register frame type=0xd0
(WLAN_FC_STYPE_ACTION) nl_handle=0x5577f86e5f30 match=7f506f9a09
1479241668.872459: nl80211: Register frame type=0xd0
(WLAN_FC_STYPE_ACTION) nl_handle=0x5577f86e5f30 match=0801
1479241668.872521: nl80211: Register frame type=0xd0
(WLAN_FC_STYPE_ACTION) nl_handle=0x5577f86e5f30 match=06
1479241668.872585: nl80211: Register frame type=0xd0
(WLAN_FC_STYPE_ACTION) nl_handle=0x5577f86e5f30 match=0a07
1479241668.872649: nl80211: Register frame type=0xd0
(WLAN_FC_STYPE_ACTION) nl_handle=0x5577f86e5f30 match=0a11
1479241668.872760: netlink: Operstate: ifindex=4 linkmode=1
(userspace-control), operstate=5 (IF_OPER_DORMANT)
1479241668.872858: nl80211: driver param='(null)'
1479241668.872874: Add interface wlan0 to a new radio phy0
1479241668.873322: nl80211: Regulatory information - country=YY (DFS-ETSI)
1479241668.873349: nl80211: 2400-2483 @ 40 MHz 33 mBm
1479241668.873366: nl80211: 5150-5250 @ 80 MHz 33 mBm (no outdoor)
1479241668.873389: nl80211: 5250-5350 @ 80 MHz 33 mBm (no outdoor) (DFS)
1479241668.873408: nl80211: 5470-5725 @ 160 MHz 33 mBm (DFS)
1479241668.873428: nl80211: 57000-66000 @ 2160 MHz 40 mBm
1479241668.882594: wlan0: Own MAC address: 30:b5:c2:fd:7b:ef
1479241668.882687: wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0
addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
1479241668.882866: wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0
addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
1479241668.883027: wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0
addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
1479241668.883185: wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0
addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
1479241668.883341: wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0
addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
1479241668.883499: wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0
addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
1479241668.883621: wlan0: RSN: flushing PMKID list in the driver
1479241668.883649: nl80211: Flush PMKIDs
1479241668.883795: wlan0: Setting scan request: 0.100000 sec
1479241668.898558: TDLS: TDLS operation not supported by driver
1479241668.898600: TDLS: Driver uses internal link setup
1479241668.898902: wlan0: WPS: UUID based on MAC address:
4ecde3e1-79f9-5479-8587-3d05c5629cf6
1479241668.911661: EAPOL: SUPP_PAE entering state DISCONNECTED
1479241668.911707: EAPOL: Supplicant port status: Unauthorized
1479241668.911726: nl80211: Skip set_supp_port(unauthorized) while not
associated
1479241668.911741: EAPOL: KEY_RX entering state NO_KEY_RECEIVE
1479241668.911753: EAPOL: SUPP_BE entering state INITIALIZE
1479241668.911767: EAP: EAP entering state DISABLED
1479241668.911987: wlan0: Added interface wlan0
1479241668.912033: wlan0: State: DISCONNECTED -> DISCONNECTED
1479241668.912056: nl80211: Set wlan0 operstate 0->0 (DORMANT)
1479241668.912075: netlink: Operstate: ifindex=4 linkmode=-1 (no
change), operstate=5 (IF_OPER_DORMANT)
1479241668.912229: random: Got 20/20 bytes from /dev/random
1479241668.912365: RTM_NEWLINK: ifi_index=4 ifname=wlan0 operstate=2
linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
1479241668.984085: wlan0: State: DISCONNECTED -> SCANNING
1479241668.984143: wlan0: Starting AP scan for wildcard SSID
1479241668.984186: wlan0: Add radio work 'scan'@0x5577f8703f20
1479241668.984228: wlan0: First radio work item in the queue - schedule
start immediately
1479241668.984302: wlan0: Starting radio work 'scan'@0x5577f8703f20
after 0.000062 second wait
1479241669.056255: nl80211: set_mac_addr for wlan0 to XXX01
1479241670.390596: wlan0: Using random MAC address XXX01
1479241670.390661: wlan0: nl80211: scan request
1479241670.390754: nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
1479241670.391339: Scan requested (ret=0) - scan timeout 10 seconds
1479241670.391454: EAPOL: disable timer tick
1479241670.391536: RTM_NEWLINK: ifi_index=4 ifname=wlan0 operstate=2
linkmode=1 ifi_family=0 ifi_flags=0x1002 ()
1479241670.391664: nl80211: Ignore interface down event since interface
wlan0 is up
1479241670.391728: RTM_NEWLINK: ifi_index=4 ifname=wlan0 operstate=2
linkmode=1 ifi_family=0 ifi_flags=0x1002 ()
1479241670.391820: nl80211: Ignore interface down event since interface
wlan0 is up
1479241670.391883: RTM_NEWLINK: ifi_index=4 ifname=wlan0 operstate=2
linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
1479241670.391977: nl80211: Event message available
1479241670.392071: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN)
received for wlan0
1479241670.392133: wlan0: nl80211: Scan trigger
1479241670.392179: wlan0: Event SCAN_STARTED (49) received
1479241670.392216: wlan0: Own scan request started a scan in 0.000783
seconds
1479241670.392264: l2_packet_receive - recvfrom: Network is down
1479241672.842497: RTM_NEWLINK: ifi_index=4 ifname=wlan0 wext
ifi_family=0 ifi_flags=0x1003 ([UP])
1479241672.842640: nl80211: Event message available
1479241672.842709: nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS)
received for wlan0
1479241672.842748: wlan0: nl80211: New scan results available
1479241672.842773: nl80211: Scan probed for SSID ''
1479241672.842821: nl80211: Scan included frequencies: 5180 5200 5220
5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660
5680 5700
1479241672.842929: wlan0: Event SCAN_RESULTS (3) received
1479241672.843019: wlan0: Scan completed in 2.450801 seconds
1479241672.843598: nl80211: Received scan results (7 BSSes)
1479241672.843913: Sorted scan results
1479241672.843960: XXX0 freq=5180 qual=0 noise=-102 level=-75 snr=27
flags=0x9 age=2428
1479241672.844010: IEs - hexdump(len=138): ...
1479241672.844233: Beacon IEs - hexdump(len=138): ...
1479241672.844453: XXX4 freq=5180 qual=0 noise=-102 level=-76 snr=26
flags=0x9 age=2416
1479241672.844494: IEs - hexdump(len=138): ...
1479241672.844763: Beacon IEs - hexdump(len=138): ...
1479241672.844999: XXX5 freq=5180 qual=0 noise=-102 level=-78 snr=24
flags=0x9 age=2444
1479241672.845049: IEs - hexdump(len=138): ...
1479241672.845268: Beacon IEs - hexdump(len=138): ...
1479241672.845486: XXX6 freq=5280 qual=0 noise=-103 level=-79 snr=24
flags=0x9 age=1996
1479241672.845532: IEs - hexdump(len=138): ...
1479241672.845753: Beacon IEs - hexdump(len=138): ...
1479241672.845972: XXX7 freq=5180 qual=0 noise=-102 level=-80 snr=22
flags=0x9 age=2440
1479241672.846009: IEs - hexdump(len=138): ...
1479241672.846221: Beacon IEs - hexdump(len=138): ...
1479241672.846530: XXX8 freq=5180 qual=0 noise=-102 level=-80 snr=22
flags=0x9 age=2428
1479241672.846562: IEs - hexdump(len=138): ...
1479241672.846772: Beacon IEs - hexdump(len=138): ...
1479241672.846984: XXX9 freq=5220 qual=0 noise=-103 level=-82 snr=21
flags=0x9 age=2320
1479241672.847011: IEs - hexdump(len=138): ...
1479241672.847220: Beacon IEs - hexdump(len=138): ...
1479241672.847445: wlan0: BSS: Start scan result update 1
1479241672.847494: wlan0: BSS: Add new id 0 BSSID XXX0 SSID 'eduroam'
1479241672.847570: wlan0: BSS: Add new id 1 BSSID XXX4 SSID 'eduroam'
1479241672.847635: wlan0: BSS: Add new id 2 BSSID XXX5 SSID 'eduroam'
1479241672.847692: wlan0: BSS: Add new id 3 BSSID XXX6 SSID 'eduroam'
1479241672.847754: wlan0: BSS: Add new id 4 BSSID XXX7 SSID 'eduroam'
1479241672.847815: wlan0: BSS: Add new id 5 BSSID XXX8 SSID 'eduroam'
1479241672.847870: wlan0: BSS: Add new id 6 BSSID XXX9 SSID 'eduroam'
1479241672.847919: BSS: last_scan_res_used=7/32
1479241672.847944: Add randomness: count=1 entropy=0
1479241672.847969: random pool - hexdump(len=128): [REMOVED]
1479241672.847989: random_mix_pool - hexdump(len=16): [REMOVED]
1479241672.848025: random_mix_pool - hexdump(len=5): [REMOVED]
1479241672.848056: random pool - hexdump(len=128): [REMOVED]
1479241672.848086: Add randomness: count=2 entropy=1
1479241672.848112: random pool - hexdump(len=128): [REMOVED]
1479241672.848131: random_mix_pool - hexdump(len=16): [REMOVED]
1479241672.848158: random_mix_pool - hexdump(len=5): [REMOVED]
1479241672.848183: random pool - hexdump(len=128): [REMOVED]
1479241672.848201: Add randomness: count=3 entropy=2
1479241672.848215: random pool - hexdump(len=128): [REMOVED]
1479241672.848234: random_mix_pool - hexdump(len=16): [REMOVED]
1479241672.848257: random_mix_pool - hexdump(len=5): [REMOVED]
1479241672.848277: random pool - hexdump(len=128): [REMOVED]
1479241672.848298: Add randomness: count=4 entropy=3
1479241672.848318: random pool - hexdump(len=128): [REMOVED]
1479241672.848337: random_mix_pool - hexdump(len=16): [REMOVED]
1479241672.848364: random_mix_pool - hexdump(len=5): [REMOVED]
1479241672.848388: random pool - hexdump(len=128): [REMOVED]
1479241672.848421: Add randomness: count=5 entropy=4
1479241672.848448: random pool - hexdump(len=128): [REMOVED]
1479241672.848474: random_mix_pool - hexdump(len=16): [REMOVED]
1479241672.848502: random_mix_pool - hexdump(len=5): [REMOVED]
1479241672.848520: random pool - hexdump(len=128): [REMOVED]
1479241672.848534: Add randomness: count=6 entropy=5
1479241672.848553: random pool - hexdump(len=128): [REMOVED]
1479241672.848578: random_mix_pool - hexdump(len=16): [REMOVED]
1479241672.848605: random_mix_pool - hexdump(len=5): [REMOVED]
1479241672.848637: random pool - hexdump(len=128): [REMOVED]
1479241672.848663: Add randomness: count=7 entropy=6
1479241672.848683: random pool - hexdump(len=128): [REMOVED]
1479241672.848712: random_mix_pool - hexdump(len=16): [REMOVED]
1479241672.848739: random_mix_pool - hexdump(len=5): [REMOVED]
1479241672.848756: random pool - hexdump(len=128): [REMOVED]
1479241672.848781: wlan0: New scan results available (own=1 ext=0)
1479241672.848878: wlan0: Radio work 'scan'@0x5577f8703f20 done in
3.864576 seconds
1479241672.848930: wlan0: Selecting BSS from priority group 0
1479241672.849003: wlan0: 0: XXX0 ssid='eduroam' wpa_ie_len=0
rsn_ie_len=20 caps=0x1011 level=-75
1479241672.849051: wlan0: selected based on RSN IE
1479241672.849108: wlan0: selected BSS XXX0 ssid='eduroam'
1479241672.849183: wlan0: Considering connect request: reassociate: 0
selected: XXX0 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00
wpa_state: SCANNING ssid=XXX3 current_ssid=(nil)
1479241672.849238: wlan0: Request association with XXX0
1479241672.849284: wlan0: Previously selected random MAC address has not
yet expired
1479241672.849322: WPA: Unrecognized EAPOL-Key Key Data IE -
hexdump(len=9): ...
1479241672.849368: WPA: Unrecognized EAPOL-Key Key Data IE -
hexdump(len=6): ...
1479241672.849397: WPA: Unrecognized EAPOL-Key Key Data IE -
hexdump(len=14): ...
1479241672.849431: WPA: RSN IE in EAPOL-Key - hexdump(len=22): ...
1479241672.849483: WPA: Unrecognized EAPOL-Key Key Data IE -
hexdump(len=32): ...
1479241672.849554: WPA: Unrecognized EAPOL-Key Key Data IE -
hexdump(len=8): ...
1479241672.849587: TDLS: TDLS is allowed in the target BSS
1479241672.849629: wlan0: Add radio work 'sme-connect'@0x5577f8703f20
1479241672.849666: wlan0: First radio work item in the queue - schedule
start immediately
1479241672.849751: wlan0: Starting radio work
'sme-connect'@0x5577f8703f20 after 0.000074 second wait
1479241672.849792: wlan0: Automatic auth_alg selection: 0x1
1479241672.849813: RSN: PMKSA cache search - network_ctx=(nil)
try_opportunistic=0
1479241672.849837: RSN: Search for BSSID XXX0
1479241672.849863: RSN: No PMKSA cache entry found
1479241672.849891: wlan0: RSN: using IEEE 802.11i/D9.0
1479241672.849927: wlan0: WPA: Selected cipher suites: group 16 pairwise
16 key_mgmt 1 proto 2
1479241672.849958: wlan0: WPA: Selected mgmt group cipher 32
1479241672.849982: wlan0: WPA: clearing AP WPA IE
1479241672.850005: WPA: set AP RSN IE - hexdump(len=22): ...
1479241672.850067: wlan0: WPA: using GTK CCMP
1479241672.850094: wlan0: WPA: using PTK CCMP
1479241672.850121: wlan0: WPA: using KEY_MGMT 802.1X
1479241672.850148: wlan0: WPA: not using MGMT group cipher
1479241672.850172: WPA: Set own WPA IE default - hexdump(len=22): ...
1479241672.850234: FT: Stored MDIE and FTIE from (Re)Association
Response - hexdump(len=0):
1479241672.850269: wlan0: Cancelling scan request
1479241672.850313: wlan0: SME: Trying to authenticate with XXX0
(SSID='eduroam' freq=5180 MHz)
1479241672.850348: wlan0: State: SCANNING -> AUTHENTICATING
1479241672.850377: EAPOL: External notification - EAP success=0
1479241672.850451: EAPOL: External notification - EAP fail=0
1479241672.850476: EAPOL: External notification - portControl=Auto
1479241672.850512: wlan0: Determining shared radio frequencies (max len 1)
1479241672.850549: wlan0: Shared frequencies (len=0): completed iteration
1479241672.850583: nl80211: Authenticate (ifindex=4)
1479241672.850613: * bssid=XXX0
1479241672.850639: * freq=5180
1479241672.850662: * SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
1479241672.850722: * IEs - hexdump(len=0): [NULL]
1479241672.850744: * Auth Type 0
1479241672.860334: nl80211: Authentication request send successfully
1479241672.860434: nl80211: Event message available
1479241672.860489: nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION)
received for wlan0
1479241672.860518: nl80211: New station XXX0
1479241672.861885: nl80211: Event message available
1479241672.861960: nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE)
received for wlan0
1479241672.862013: nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on
wlan0(XXX01) A1=XXX01 A2=XXX0
1479241672.862067: nl80211: MLME event frame - hexdump(len=30): ...
1479241672.862141: nl80211: Authenticate event
1479241672.862175: wlan0: Event AUTH (11) received
1479241672.862222: wlan0: SME: Authentication response: peer=XXX0
auth_type=0 auth_transaction=2 status_code=0
1479241672.862257: SME: Authentication response IEs - hexdump(len=0): [NULL]
1479241672.862302: wlan0: set_disable_max_amsdu: -1
1479241672.862340: wlan0: set_ampdu_factor: -1
1479241672.862455: wlan0: set_ampdu_density: -1
1479241672.862503: wlan0: set_disable_ht40: 0
1479241672.862527: wlan0: set_disable_sgi: 0
1479241672.862549: wlan0: set_disable_ldpc: 0
1479241672.862589: wlan0: Trying to associate with XXX0 (SSID='eduroam'
freq=5180 MHz)
1479241672.862617: wlan0: State: AUTHENTICATING -> ASSOCIATING
1479241672.862636: nl80211: Set wlan0 operstate 0->0 (DORMANT)
1479241672.862655: netlink: Operstate: ifindex=4 linkmode=-1 (no
change), operstate=5 (IF_OPER_DORMANT)
1479241672.862713: WPA: set own WPA/RSN IE - hexdump(len=22): ...
1479241672.862785: nl80211: Associate (ifindex=4)
1479241672.862811: * bssid=XXX0
1479241672.862834: * freq=5180
1479241672.862849: * SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
1479241672.862906: * IEs - hexdump(len=32): ...
1479241672.862985: * WPA Versions 0x2
1479241672.863017: * pairwise=0xfac04
1479241672.863047: * group=0xfac04
1479241672.863076: * akm=0xfac01
1479241672.863105: * htcaps - hexdump(len=26): ...
1479241672.863171: * htcaps_mask - hexdump(len=26): ...
1479241672.863236: * vhtcaps - hexdump(len=12): ...
1479241672.863272: * vhtcaps_mask - hexdump(len=12): ...
1479241672.863473: nl80211: Association request send successfully
1479241672.871473: RTM_NEWLINK: ifi_index=4 ifname=wlan0 wext
ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1479241672.871627: RTM_NEWLINK: ifi_index=4 ifname=wlan0 wext
ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1479241672.871744: RTM_NEWLINK: ifi_index=4 ifname=wlan0 operstate=5
linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1479241672.871849: nl80211: Event message available
1479241672.871920: nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE)
received for wlan0
1479241672.871952: nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on
wlan0(XXX01) A1=XXX01 A2=XXX0
1479241672.871990: nl80211: MLME event frame - hexdump(len=40): ....
1479241672.872078: nl80211: Associate event
1479241672.872108: wlan0: Event ASSOC (0) received
1479241672.872142: wlan0: Association info event
1479241672.872160: resp_ies - hexdump(len=10): ...
1479241672.872210: wlan0: freq=5180 MHz
1479241672.872238: FT: Stored MDIE and FTIE from (Re)Association
Response - hexdump(len=0):
1479241672.872274: wlan0: State: ASSOCIATING -> ASSOCIATED
1479241672.872299: nl80211: Set wlan0 operstate 0->0 (DORMANT)
1479241672.872324: netlink: Operstate: ifindex=4 linkmode=-1 (no
change), operstate=5 (IF_OPER_DORMANT)
1479241672.872405: wlan0: Associated to a new BSS: BSSID=XXX0
1479241672.872437: Add randomness: count=8 entropy=7
1479241672.872460: random pool - hexdump(len=128): [REMOVED]
1479241672.872482: random_mix_pool - hexdump(len=16): [REMOVED]
1479241672.872503: random_mix_pool - hexdump(len=6): [REMOVED]
1479241672.872523: random pool - hexdump(len=128): [REMOVED]
1479241672.872564: wlan0: Associated with XXX0
1479241672.872594: wlan0: WPA: Association event - clear replay counter
1479241672.872625: wlan0: WPA: Clear old PTK
1479241672.872648: TDLS: Remove peers on association
1479241672.872669: EAPOL: External notification - portEnabled=0
1479241672.872695: EAPOL: External notification - portValid=0
1479241672.872717: EAPOL: External notification - portEnabled=1
1479241672.872737: EAPOL: SUPP_PAE entering state CONNECTING
1479241672.872756: EAPOL: enable timer tick
1479241672.872780: EAPOL: SUPP_BE entering state IDLE
1479241672.872802: EAP: EAP entering state INITIALIZE
1479241672.872824: EAP: EAP entering state IDLE
1479241672.872861: wlan0: Setting authentication timeout: 10 sec 0 usec
1479241672.872897: wlan0: Cancelling scan request
1479241672.872962: nl80211: Event message available
1479241672.873024: nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received
for wlan0
1479241672.873057: nl80211: Ignore connect event (cmd=46) when using
userspace SME
1479241672.873120: wlan0: RX EAPOL from XXX0
1479241672.873152: RX EAPOL - hexdump(len=52): ...
1479241672.873259: wlan0: Setting authentication timeout: 70 sec 0 usec
1479241672.873292: EAPOL: Received EAP-Packet frame
1479241672.873316: EAPOL: SUPP_PAE entering state RESTART
1479241672.873337: EAP: EAP entering state INITIALIZE
1479241672.873357: EAP: EAP entering state IDLE
1479241672.873376: EAPOL: SUPP_PAE entering state AUTHENTICATING
1479241672.873395: EAPOL: SUPP_BE entering state REQUEST
1479241672.873412: EAPOL: getSuppRsp
1479241672.873428: EAP: EAP entering state RECEIVED
1479241672.873491: EAP: Received EAP-Request id=1 method=1 vendor=0
vendorMethod=0
1479241672.873523: EAP: EAP entering state IDENTITY
1479241672.873546: wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
1479241672.873565: EAP: Status notification: started (param=)
1479241672.873592: EAP: EAP-Request Identity data - hexdump_ascii(len=43):
YYY _networkid=eduro
YYY am,nasid=wlc-214
YYY 1,portid=13
1479241672.873750: EAP: using anonymous identity - hexdump_ascii(len=26):
YYY anonymous@YYY
YYY YYY
1479241672.873842: EAP: EAP entering state SEND_RESPONSE
1479241672.873860: EAP: EAP entering state IDLE
1479241672.873884: EAPOL: SUPP_BE entering state RESPONSE
1479241672.873906: EAPOL: txSuppRsp
1479241672.873929: TX EAPOL: dst=XXX0
1479241672.873954: TX EAPOL - hexdump(len=35): ...
1479241672.874107: EAPOL: SUPP_BE entering state RECEIVE
1479241672.883687: wlan0: RX EAPOL from XXX0
1479241672.883738: RX EAPOL - hexdump(len=10): ...
1479241672.883785: EAPOL: Received EAP-Packet frame
1479241672.883816: EAPOL: SUPP_BE entering state REQUEST
1479241672.883832: EAPOL: getSuppRsp
1479241672.883852: EAP: EAP entering state RECEIVED
1479241672.883895: EAP: Received EAP-Request id=2 method=21 vendor=0
vendorMethod=0
1479241672.883928: EAP: EAP entering state GET_METHOD
1479241672.883964: wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21
1479241672.883989: EAP: Status notification: accept proposed method
(param=TTLS)
1479241672.884027: EAP: Initialize selected EAP method: vendor 0 method
21 (TTLS)
1479241672.884059: EAP-TTLS: Phase2 type: PAP
1479241672.884082: TLS: using phase1 config options
1479241672.885373: TLS: Trusted root certificate(s) loaded
1479241672.885443: wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21
(TTLS) selected
1479241672.885470: EAP: EAP entering state METHOD
1479241672.885491: SSL: Received packet(len=6) - Flags 0x20
1479241672.885518: EAP-TTLS: Start (server ver=0, own ver=0)
1479241672.885634: SSL: (where=0x10 ret=0x1)
1479241672.885797: SSL: (where=0x1001 ret=0x1)
1479241672.885832: SSL: SSL_connect:before/connect initialization
1479241672.885967: OpenSSL: TX ver=0x301 content_type=22
1479241672.886003: OpenSSL: Message - hexdump(len=188): [REMOVED]
1479241672.886036: SSL: (where=0x1001 ret=0x1)
1479241672.886059: SSL: SSL_connect:unknown state
1479241672.886096: SSL: (where=0x1002 ret=0xffffffff)
1479241672.886121: SSL: SSL_connect:error in unknown state
1479241672.886166: SSL: SSL_connect - want more data
1479241672.886195: SSL: 193 bytes pending from ssl_out
1479241672.886231: SSL: 193 bytes left to be sent out (of total 193 bytes)
1479241672.886264: EAP: method process -> ignore=FALSE
methodState=MAY_CONT decision=FAIL eapRespData=0x5577f8705d40
1479241672.886296: EAP: EAP entering state SEND_RESPONSE
1479241672.886321: EAP: EAP entering state IDLE
1479241672.886346: EAPOL: SUPP_BE entering state RESPONSE
1479241672.886368: EAPOL: txSuppRsp
1479241672.886455: TX EAPOL: dst=XXX0
1479241672.886486: TX EAPOL - hexdump(len=203): ...
1479241672.886888: EAPOL: SUPP_BE entering state RECEIVE
1479241672.886966: nl80211: Event message available
1479241672.887054: nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE)
received for wlan0
1479241672.887094: nl80211: Regulatory domain change
1479241672.887117: * initiator=3
1479241672.887135: * type=0
1479241672.887155: * alpha2=DE
1479241672.887186: wlan0: Event CHANNEL_LIST_CHANGED (30) received
1479241672.887222: wlan0: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE
type=COUNTRY alpha2=DE
1479241672.888182: nl80211: Regulatory information - country=YY (DFS-ETSI)
1479241672.888226: nl80211: 2400-2483 @ 40 MHz 33 mBm
1479241672.888256: nl80211: 5150-5250 @ 80 MHz 33 mBm (no outdoor)
1479241672.888281: nl80211: 5250-5350 @ 80 MHz 33 mBm (no outdoor) (DFS)
1479241672.888313: nl80211: 5470-5725 @ 160 MHz 33 mBm (DFS)
1479241672.888346: nl80211: 57000-66000 @ 2160 MHz 40 mBm
1479241672.899760: wlan0: RX EAPOL from XXX0
1479241672.899801: RX EAPOL - hexdump(len=1028): ...
1479241672.901239: EAPOL: Received EAP-Packet frame
1479241672.901258: EAPOL: SUPP_BE entering state REQUEST
1479241672.901270: EAPOL: getSuppRsp
1479241672.901282: EAP: EAP entering state RECEIVED
1479241672.901326: EAP: Received EAP-Request id=3 method=21 vendor=0
vendorMethod=0
1479241672.901350: EAP: EAP entering state METHOD
1479241672.901372: SSL: Received packet(len=1024) - Flags 0xc0
1479241672.901391: SSL: TLS Message Length: 5521
1479241672.901413: SSL: Need 4507 bytes more input data
1479241672.901445: SSL: Building ACK (type=21 id=3 ver=0)
1479241672.901470: EAP: method process -> ignore=FALSE
methodState=MAY_CONT decision=FAIL eapRespData=0x5577f8706710
1479241672.901499: EAP: EAP entering state SEND_RESPONSE
1479241672.901523: EAP: EAP entering state IDLE
1479241672.901544: EAPOL: SUPP_BE entering state RESPONSE
1479241672.901564: EAPOL: txSuppRsp
1479241672.901583: TX EAPOL: dst=XXX0
1479241672.901606: TX EAPOL - hexdump(len=10): ...
1479241672.901708: EAPOL: SUPP_BE entering state RECEIVE
1479241672.913457: wlan0: RX EAPOL from XXX0
1479241672.913498: RX EAPOL - hexdump(len=1028): ...
1479241672.914975: EAPOL: Received EAP-Packet frame
1479241672.914994: EAPOL: SUPP_BE entering state REQUEST
1479241672.915007: EAPOL: getSuppRsp
1479241672.915019: EAP: EAP entering state RECEIVED
1479241672.915061: EAP: Received EAP-Request id=4 method=21 vendor=0
vendorMethod=0
1479241672.915099: EAP: EAP entering state METHOD
1479241672.915127: SSL: Received packet(len=1024) - Flags 0xc0
1479241672.915151: SSL: TLS Message Length: 5521
1479241672.915173: SSL: Need 3493 bytes more input data
1479241672.915197: SSL: Building ACK (type=21 id=4 ver=0)
1479241672.915216: EAP: method process -> ignore=FALSE
methodState=MAY_CONT decision=FAIL eapRespData=0x5577f87058b0
1479241672.915242: EAP: EAP entering state SEND_RESPONSE
1479241672.915270: EAP: EAP entering state IDLE
1479241672.915287: EAPOL: SUPP_BE entering state RESPONSE
1479241672.915305: EAPOL: txSuppRsp
1479241672.915321: TX EAPOL: dst=XXX0
1479241672.915344: TX EAPOL - hexdump(len=10): ...
1479241672.915438: EAPOL: SUPP_BE entering state RECEIVE
1479241672.924881: wlan0: RX EAPOL from XXX0
1479241672.924922: RX EAPOL - hexdump(len=1028): ...
1479241672.926362: EAPOL: Received EAP-Packet frame
1479241672.926425: EAPOL: SUPP_BE entering state REQUEST
1479241672.926447: EAPOL: getSuppRsp
1479241672.926503: EAP: EAP entering state RECEIVED
1479241672.926549: EAP: Received EAP-Request id=5 method=21 vendor=0
vendorMethod=0
1479241672.926574: EAP: EAP entering state METHOD
1479241672.926597: SSL: Received packet(len=1024) - Flags 0xc0
1479241672.926654: SSL: TLS Message Length: 5521
1479241672.926704: SSL: Need 2479 bytes more input data
1479241672.926731: SSL: Building ACK (type=21 id=5 ver=0)
1479241672.926749: EAP: method process -> ignore=FALSE
methodState=MAY_CONT decision=FAIL eapRespData=0x5577f86e85b0
1479241672.926771: EAP: EAP entering state SEND_RESPONSE
1479241672.926788: EAP: EAP entering state IDLE
1479241672.926805: EAPOL: SUPP_BE entering state RESPONSE
1479241672.926818: EAPOL: txSuppRsp
1479241672.926831: TX EAPOL: dst=XXX0
1479241672.926849: TX EAPOL - hexdump(len=10): ...
1479241672.926942: EAPOL: SUPP_BE entering state RECEIVE
1479241672.937738: wlan0: RX EAPOL from XXX0
1479241672.937780: RX EAPOL - hexdump(len=1028): ...
1479241672.939275: EAPOL: Received EAP-Packet frame
1479241672.939294: EAPOL: SUPP_BE entering state REQUEST
1479241672.939306: EAPOL: getSuppRsp
1479241672.939328: EAP: EAP entering state RECEIVED
1479241672.939372: EAP: Received EAP-Request id=6 method=21 vendor=0
vendorMethod=0
1479241672.939403: EAP: EAP entering state METHOD
1479241672.939427: SSL: Received packet(len=1024) - Flags 0xc0
1479241672.939451: SSL: TLS Message Length: 5521
1479241672.939472: SSL: Need 1465 bytes more input data
1479241672.939496: SSL: Building ACK (type=21 id=6 ver=0)
1479241672.939519: EAP: method process -> ignore=FALSE
methodState=MAY_CONT decision=FAIL eapRespData=0x5577f86e84d0
1479241672.939547: EAP: EAP entering state SEND_RESPONSE
1479241672.939565: EAP: EAP entering state IDLE
1479241672.939585: EAPOL: SUPP_BE entering state RESPONSE
1479241672.939604: EAPOL: txSuppRsp
1479241672.939623: TX EAPOL: dst=XXX0
1479241672.939647: TX EAPOL - hexdump(len=10): ...
1479241672.939744: EAPOL: SUPP_BE entering state RECEIVE
1479241672.950773: wlan0: RX EAPOL from XXX0
1479241672.950813: RX EAPOL - hexdump(len=1028): ...
1479241672.952297: EAPOL: Received EAP-Packet frame
1479241672.952317: EAPOL: SUPP_BE entering state REQUEST
1479241672.952330: EAPOL: getSuppRsp
1479241672.952342: EAP: EAP entering state RECEIVED
1479241672.952383: EAP: Received EAP-Request id=7 method=21 vendor=0
vendorMethod=0
1479241672.952407: EAP: EAP entering state METHOD
1479241672.952441: SSL: Received packet(len=1024) - Flags 0xc0
1479241672.952468: SSL: TLS Message Length: 5521
1479241672.952509: SSL: Need 451 bytes more input data
1479241672.952544: SSL: Building ACK (type=21 id=7 ver=0)
1479241672.952571: EAP: method process -> ignore=FALSE
methodState=MAY_CONT decision=FAIL eapRespData=0x5577f8706710
1479241672.952598: EAP: EAP entering state SEND_RESPONSE
1479241672.952616: EAP: EAP entering state IDLE
1479241672.952636: EAPOL: SUPP_BE entering state RESPONSE
1479241672.952655: EAPOL: txSuppRsp
1479241672.952674: TX EAPOL: dst=XXX0
1479241672.952698: TX EAPOL - hexdump(len=10): 02 00 00 06 02 07 00 06 15 00
1479241672.952792: EAPOL: SUPP_BE entering state RECEIVE
1479241672.961005: wlan0: RX EAPOL from XXX0
1479241672.961046: RX EAPOL - hexdump(len=465): ...
1479241672.961701: EAPOL: Received EAP-Packet frame
1479241672.961720: EAPOL: SUPP_BE entering state REQUEST
1479241672.961738: EAPOL: getSuppRsp
1479241672.961756: EAP: EAP entering state RECEIVED
1479241672.961796: EAP: Received EAP-Request id=8 method=21 vendor=0
vendorMethod=0
1479241672.961830: EAP: EAP entering state METHOD
1479241672.961859: SSL: Received packet(len=461) - Flags 0x80
1479241672.961883: SSL: TLS Message Length: 5521
1479241672.962024: OpenSSL: RX ver=0x301 content_type=22
1479241672.962062: OpenSSL: Message - hexdump(len=62): [REMOVED]
1479241672.962180: SSL: (where=0x1001 ret=0x1)
1479241672.962215: SSL: SSL_connect:unknown state
1479241672.962502: OpenSSL: RX ver=0x301 content_type=22
1479241672.962538: OpenSSL: Message - hexdump(len=5104): [REMOVED]
1479241672.965629: TLS: tls_verify_cb - preverify_ok=1 err=0 (ok)
ca_cert_verify=1 depth=3 buf='YYY'
1479241672.965710: wlan0: CTRL-EVENT-EAP-PEER-CERT depth=3 subject='YYY'
1479241672.965740: EAP: Status notification: remote certificate
verification (param=success)
1479241672.967243: TLS: tls_verify_cb - preverify_ok=1 err=0 (ok)
ca_cert_verify=1 depth=2 buf='YYY'
1479241672.967313: wlan0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='YYY'
1479241672.967340: EAP: Status notification: remote certificate
verification (param=success)
1479241672.968633: TLS: tls_verify_cb - preverify_ok=1 err=0 (ok)
ca_cert_verify=1 depth=1 buf='YYY'
1479241672.968701: wlan0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='YYY'
1479241672.968729: EAP: Status notification: remote certificate
verification (param=success)
1479241672.969950: TLS: tls_verify_cb - preverify_ok=1 err=0 (ok)
ca_cert_verify=1 depth=0 buf='YYY'
1479241672.970001: TLS: Match domain against suffix YYY
1479241672.970057: TLS: Certificate dNSName - hexdump_ascii(len=23):
YYY
YYY
1479241672.970174: TLS: Suffix match in dNSName found
1479241672.970224: wlan0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='YYY'
1479241672.970263: EAP: Status notification: remote certificate
verification (param=success)
1479241672.970431: SSL: (where=0x1001 ret=0x1)
1479241672.970470: SSL: SSL_connect:unknown state
1479241672.970537: OpenSSL: RX ver=0x301 content_type=22
1479241672.970568: OpenSSL: Message - hexdump(len=331): [REMOVED]
1479241672.971867: SSL: (where=0x1001 ret=0x1)
1479241672.971905: SSL: SSL_connect:unknown state
1479241672.971936: OpenSSL: RX ver=0x301 content_type=22
1479241672.971957: OpenSSL: Message - hexdump(len=4): [REMOVED]
1479241672.971974: SSL: (where=0x1001 ret=0x1)
1479241672.971998: SSL: SSL_connect:unknown state
1479241672.976743: OpenSSL: TX ver=0x301 content_type=22
1479241672.976766: OpenSSL: Message - hexdump(len=70): [REMOVED]
1479241672.976777: SSL: (where=0x1001 ret=0x1)
1479241672.976785: SSL: SSL_connect:unknown state
1479241672.976796: OpenSSL: TX ver=0x301 content_type=20
1479241672.976805: OpenSSL: Message - hexdump(len=1): [REMOVED]
1479241672.977279: SSL: (where=0x1001 ret=0x1)
1479241672.977300: SSL: SSL_connect:unknown state
1479241672.977456: OpenSSL: TX ver=0x301 content_type=22
1479241672.977477: OpenSSL: Message - hexdump(len=16): [REMOVED]
1479241672.977488: SSL: (where=0x1001 ret=0x1)
1479241672.977496: SSL: SSL_connect:unknown state
1479241672.977516: SSL: (where=0x1001 ret=0x1)
1479241672.977531: SSL: SSL_connect:unknown state
1479241672.977549: SSL: (where=0x1002 ret=0xffffffff)
1479241672.977571: SSL: SSL_connect:error in unknown state
1479241672.977594: SSL: SSL_connect - want more data
1479241672.977626: SSL: 134 bytes pending from ssl_out
1479241672.977647: SSL: 134 bytes left to be sent out (of total 134 bytes)
1479241672.977678: EAP: method process -> ignore=FALSE
methodState=MAY_CONT decision=FAIL eapRespData=0x5577f8725810
1479241672.977698: EAP: EAP entering state SEND_RESPONSE
1479241672.977710: EAP: EAP entering state IDLE
1479241672.977725: EAPOL: SUPP_BE entering state RESPONSE
1479241672.977738: EAPOL: txSuppRsp
1479241672.977749: TX EAPOL: dst=XXX0
1479241672.977763: TX EAPOL - hexdump(len=144): ...
1479241672.977940: EAPOL: SUPP_BE entering state RECEIVE
1479241672.986622: wlan0: RX EAPOL from XXX0
1479241672.986654: RX EAPOL - hexdump(len=73): ...
1479241672.986788: EAPOL: Received EAP-Packet frame
1479241672.986811: EAPOL: SUPP_BE entering state REQUEST
1479241672.986832: EAPOL: getSuppRsp
1479241672.986850: EAP: EAP entering state RECEIVED
1479241672.986887: EAP: Received EAP-Request id=9 method=21 vendor=0
vendorMethod=0
1479241672.986918: EAP: EAP entering state METHOD
1479241672.986942: SSL: Received packet(len=69) - Flags 0x80
1479241672.986961: SSL: TLS Message Length: 59
1479241672.987028: OpenSSL: RX ver=0x301 content_type=20
1479241672.987062: OpenSSL: Message - hexdump(len=1): [REMOVED]
1479241672.987551: OpenSSL: RX ver=0x301 content_type=22
1479241672.987588: OpenSSL: Message - hexdump(len=16): [REMOVED]
1479241672.987619: SSL: (where=0x1001 ret=0x1)
1479241672.987637: SSL: SSL_connect:unknown state
1479241672.987706: SSL: (where=0x20 ret=0x1)
1479241672.987742: SSL: (where=0x1002 ret=0x1)
1479241672.987759: SSL: 0 bytes pending from ssl_out
1479241672.987790: SSL: No Application Data included
1479241672.987822: SSL: No data to be sent out
1479241672.987848: EAP-TTLS: TLS done, proceed to Phase 2
1479241672.988273: OpenSSL: Using internal PRF
1479241672.988306: EAP-TTLS: Derived key - hexdump(len=64): [REMOVED]
1479241672.988329: EAP-TTLS: Derived Session-Id - hexdump(len=65): ...
1479241672.988440: EAP-TTLS: received 0 bytes encrypted data for Phase 2
1479241672.988466: EAP-TTLS: empty data in beginning of Phase 2 - use
fake EAP-Request Identity
1479241672.988486: EAP-TTLS: Phase 2 PAP Request
1479241672.988510: EAP-TTLS: Encrypting Phase 2 data - hexdump(len=60):
[REMOVED]
1479241672.988576: SSL: 138 bytes left to be sent out (of total 138 bytes)
1479241672.988613: EAP-TTLS: Authentication completed successfully
1479241672.988631: EAP: method process -> ignore=FALSE
methodState=MAY_CONT decision=COND_SUCC eapRespData=0x5577f87193b0
1479241672.988655: EAP: Session-Id - hexdump(len=65): ...
1479241672.988767: EAP: EAP entering state SEND_RESPONSE
1479241672.988796: EAP: EAP entering state IDLE
1479241672.988819: EAPOL: SUPP_BE entering state RESPONSE
1479241672.988838: EAPOL: txSuppRsp
1479241672.988857: TX EAPOL: dst=XXX0
1479241672.988881: TX EAPOL - hexdump(len=148): ...
1479241672.989164: EAPOL: SUPP_BE entering state RECEIVE
1479241673.035321: wlan0: RX EAPOL from XXX0
1479241673.035364: RX EAPOL - hexdump(len=8): ...
1479241673.035403: EAPOL: Received EAP-Packet frame
1479241673.035419: EAPOL: SUPP_BE entering state REQUEST
1479241673.035432: EAPOL: getSuppRsp
1479241673.035451: EAP: EAP entering state RECEIVED
1479241673.035488: EAP: Received EAP-Success
1479241673.035512: EAP: Status notification: completion (param=success)
1479241673.035547: EAP: EAP entering state SUCCESS
1479241673.035583: wlan0: CTRL-EVENT-EAP-SUCCESS EAP authentication
completed successfully
1479241673.035624: EAPOL: SUPP_BE entering state RECEIVE
1479241673.035646: EAPOL: SUPP_BE entering state SUCCESS
1479241673.035661: EAPOL: SUPP_BE entering state IDLE
1479241673.035740: wlan0: RX EAPOL from XXX0
1479241673.035771: RX EAPOL - hexdump(len=121): ...
1479241673.035968: EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state
machines
1479241673.036000: wlan0: IEEE 802.1X RX: version=2 type=3 length=117
1479241673.036018: WPA: RX EAPOL-Key - hexdump(len=121): ...
1479241673.036218: wlan0: EAPOL-Key type=2
1479241673.036261: wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0
Pairwise Ack)
1479241673.036287: wlan0: key_length=16 key_data_length=22
1479241673.036311: replay_counter - hexdump(len=8): 00 00 00 00 00 00
00 00
1479241673.036343: key_nonce - hexdump(len=32): ...
1479241673.036410: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
1479241673.036446: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1479241673.036472: key_id (reserved) - hexdump(len=8): 00 00 00 00 00
00 00 00
1479241673.036497: key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
1479241673.036563: wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
1479241673.036618: wlan0: WPA: RX message 1 of 4-Way Handshake from XXX0
(ver=2)
1479241673.036645: RSN: msg 1/4 key data - hexdump(len=22): ...
1479241673.036697: WPA: PMKID in EAPOL-Key - hexdump(len=22): ...
1479241673.036749: RSN: PMKID from Authenticator - hexdump(len=16): ...
1479241673.036801: wlan0: RSN: no matching PMKID found
1479241673.036826: EAPOL: Successfully fetched key (len=32)
1479241673.036851: EAPOL: Successfully fetched key (len=64)
1479241673.036875: WPA: PMK from EAPOL state machines - hexdump(len=32):
[REMOVED]
1479241673.036945: RSN: Added PMKSA cache entry for XXX0 network_ctx=XXX3
1479241673.036984: nl80211: Add PMKID for XXX0
1479241673.037199: wlan0: RSN: the new PMK matches with the PMKID
1479241673.037236: Get randomness: len=32 entropy=8
1479241673.040828: random from os_get_random - hexdump(len=32): [REMOVED]
1479241673.040905: random_mix_pool - hexdump(len=20): [REMOVED]
1479241673.040959: random from internal pool - hexdump(len=16): [REMOVED]
1479241673.041006: random_mix_pool - hexdump(len=20): [REMOVED]
1479241673.041058: random from internal pool - hexdump(len=16): [REMOVED]
1479241673.041085: mixed random - hexdump(len=32): [REMOVED]
1479241673.041104: WPA: Renewed SNonce - hexdump(len=32): ...
1479241673.041224: WPA: PTK derivation - A1=XXX01 A2=XXX0
1479241673.041262: WPA: Nonce1 - hexdump(len=32): ...
1479241673.041320: WPA: Nonce2 - hexdump(len=32):...
1479241673.041380: WPA: PMK - hexdump(len=32): [REMOVED]
1479241673.041395: WPA: PTK - hexdump(len=48): [REMOVED]
1479241673.041410: WPA: WPA IE for msg 2/4 - hexdump(len=22): ...
1479241673.041459: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00
00 00 00
1479241673.041498: wlan0: WPA: Sending EAPOL-Key 2/4
1479241673.041554: WPA: KCK - hexdump(len=16): [REMOVED]
1479241673.041585: WPA: Derived Key MIC - hexdump(len=16): ...
1479241673.041628: WPA: TX EAPOL-Key - hexdump(len=121): ...
1479241673.043815: wlan0: RX EAPOL from XXX0
1479241673.043858: RX EAPOL - hexdump(len=155): ...
1479241673.044096: EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state
machines
1479241673.044129: wlan0: IEEE 802.1X RX: version=2 type=3 length=151
1479241673.044148: WPA: RX EAPOL-Key - hexdump(len=155): ...
1479241673.044395: wlan0: EAPOL-Key type=2
1479241673.044441: wlan0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0
Pairwise Install Ack MIC Secure Encr)
1479241673.044481: wlan0: key_length=16 key_data_length=56
1479241673.044508: replay_counter - hexdump(len=8): 00 00 00 00 00 00
00 01
1479241673.044542: key_nonce - hexdump(len=32): ...
1479241673.044608: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
1479241673.044645: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1479241673.044669: key_id (reserved) - hexdump(len=8): 00 00 00 00 00
00 00 00
1479241673.044693: key_mic - hexdump(len=16): ...
1479241673.044782: RSN: encrypted key data - hexdump(len=56): ...
1479241673.044946: WPA: decrypted EAPOL-Key key data - hexdump(len=48):
[REMOVED]
1479241673.044991: wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1479241673.045037: wlan0: WPA: RX message 3 of 4-Way Handshake from XXX0
(ver=2)
1479241673.045062: WPA: IE KeyData - hexdump(len=48): ...
1479241673.045157: WPA: RSN IE in EAPOL-Key - hexdump(len=22): ...
1479241673.045213: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
1479241673.045249: wlan0: WPA: Sending EAPOL-Key 4/4
1479241673.045307: WPA: KCK - hexdump(len=16): [REMOVED]
1479241673.045336: WPA: Derived Key MIC - hexdump(len=16): ...
1479241673.045385: WPA: TX EAPOL-Key - hexdump(len=99): ...
1479241673.045609: wlan0: WPA: Installing PTK to the driver
1479241673.045707: wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=3
addr=0x5577f86e6ff8 key_idx=0 set_tx=1 seq_len=6 key_len=16
1479241673.045771: nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
1479241673.045803: nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
1479241673.045833: addr=XXX0
1479241673.046282: EAPOL: External notification - portValid=1
1479241673.046311: EAPOL: SUPP_PAE entering state AUTHENTICATED
1479241673.046333: EAPOL: Supplicant port status: Authorized
1479241673.046352: nl80211: Set supplicant port authorized for XXX0
1479241673.046666: EAPOL authentication completed - result=SUCCESS
1479241673.046711: wlan0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
1479241673.046732: RSN: received GTK in pairwise handshake -
hexdump(len=18): [REMOVED]
1479241673.046759: WPA: Group Key - hexdump(len=16): [REMOVED]
1479241673.046781: wlan0: WPA: Installing GTK to the driver (keyidx=1
tx=0 len=16)
1479241673.046796: WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
1479241673.046861: wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=3
addr=0x5577f7171964 key_idx=1 set_tx=0 seq_len=6 key_len=16
1479241673.046903: nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
1479241673.046922: nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
1479241673.046948: broadcast key
1479241673.047387: wlan0: WPA: Key negotiation completed with XXX0
[PTK=CCMP GTK=CCMP]
1479241673.047423: wlan0: Cancelling authentication timeout
1479241673.047446: wlan0: State: GROUP_HANDSHAKE -> COMPLETED
1479241673.047476: wlan0: Radio work 'sme-connect'@0x5577f8703f20 done
in 0.197730 seconds
1479241673.047507: wlan0: CTRL-EVENT-CONNECTED - Connection to XXX0
completed [id=0 id_str=]
1479241673.047539: nl80211: Set wlan0 operstate 0->1 (UP)
1479241673.047562: netlink: Operstate: ifindex=4 linkmode=-1 (no
change), operstate=6 (IF_OPER_UP)
1479241673.047647: EAPOL: External notification - portValid=1
1479241673.047783: RTM_NEWLINK: ifi_index=4 ifname=wlan0 operstate=6
linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
1479241674.874798: EAPOL: startWhen --> 0
1479241702.907667: EAPOL: authWhile --> 0
1479241732.940044: EAPOL: idleWhile --> 0
1479241732.940097: EAPOL: disable timer tick
1479241812.886928: RTM_NEWLINK: ifi_index=4 ifname=wlan0 operstate=2
linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
1479241812.915369: nl80211: Event message available
1479241812.915470: nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION)
received for wlan0
1479241812.915544: nl80211: Delete station XXX0
1479241812.917467: nl80211: Event message available
1479241812.917554: nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE)
received for wlan0
1479241812.917624: nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE)
on wlan0(XXX01) A1=XXX01 A2=XXX0
1479241812.917676: nl80211: MLME event frame - hexdump(len=26): ...
1479241812.917735: nl80211: Deauthenticate event
1479241812.917778: wlan0: Event DEAUTH (12) received
1479241812.917820: wlan0: Deauthentication notification
1479241812.917860: wlan0: * reason 2
1479241812.917902: wlan0: * address XXX0
1479241812.917929: Deauthentication frame IE(s) - hexdump(len=0): [NULL]
1479241812.917981: wlan0: CTRL-EVENT-DISCONNECTED bssid=XXX0 reason=2
1479241812.918105: wlan0: Auto connect enabled: try to reconnect
(wps=0/0 wpa_state=9)
1479241812.918160: wlan0: Setting scan request: 0.100000 sec
>> iwconfig wlan0
wlan0 IEEE 802.11 ESSID:"eduroam"
Mode:Managed Frequency:5.18 GHz Access Point: XXX0
Bit Rate=6 Mb/s Tx-Power=17 dBm
Retry short limit:7 RTS thr:off Fragment thr:off
Encryption key:off
Power Management:on
Link Quality=33/70 Signal level=-77 dBm
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:0 Invalid misc:1 Missed beacon:0
>> journalctl
Nov 15 21:27:17 android3427 kernel: ath10k_pci 0000:02:00.0: pci irq msi
oper_irq_mode 2 irq_mode 0 reset_mode 0
Nov 15 21:27:17 android3427 kernel: ath10k_pci 0000:02:00.0: firmware:
failed to load ath10k/pre-cal-pci-0000:02:00.0.bin (-2)
Nov 15 21:27:17 android3427 kernel: ath10k_pci 0000:02:00.0: Direct
firmware load for ath10k/pre-cal-pci-0000:02:00.0.bin failed with e
Nov 15 21:27:17 android3427 kernel: ath10k_pci 0000:02:00.0: firmware:
failed to load ath10k/cal-pci-0000:02:00.0.bin (-2)
Nov 15 21:27:17 android3427 kernel: ath10k_pci 0000:02:00.0: Direct
firmware load for ath10k/cal-pci-0000:02:00.0.bin failed with error
Nov 15 21:27:17 android3427 kernel: ath10k_pci 0000:02:00.0: firmware:
direct-loading firmware ath10k/QCA988X/hw2.0/firmware-5.bin
Nov 15 21:27:17 android3427 kernel: ath10k_pci 0000:02:00.0: qca988x
hw2.0 target 0x4100016c chip_id 0x043202ff sub 19b6:d03c
Nov 15 21:27:17 android3427 kernel: ath10k_pci 0000:02:00.0: kconfig
debug 0 debugfs 0 tracing 0 dfs 0 testmode 0
Nov 15 21:27:17 android3427 kernel: ath10k_pci 0000:02:00.0: firmware
ver 10.2.4.70.58 api 5 features no-p2p,raw-mode,mfp crc32 e1af076
Nov 15 21:27:17 android3427 kernel: ath10k_pci 0000:02:00.0: firmware:
failed to load ath10k/QCA988X/hw2.0/board-2.bin (-2)
Nov 15 21:27:17 android3427 kernel: ath10k_pci 0000:02:00.0: Direct
firmware load for ath10k/QCA988X/hw2.0/board-2.bin failed with erro
Nov 15 21:27:17 android3427 kernel: ath10k_pci 0000:02:00.0: firmware:
direct-loading firmware ath10k/QCA988X/hw2.0/board.bin
Nov 15 21:27:17 android3427 kernel: ath10k_pci 0000:02:00.0: board_file
api 1 bmi_id N/A crc32 bebc7c08
Nov 15 21:27:18 android3427 kernel: ath10k_pci 0000:02:00.0: htt-ver 2.1
wmi-op 5 htt-op 2 cal otp max-sta 128 raw 0 hwcrypto 1
Nov 15 21:27:18 android3427 kernel: ath: EEPROM regdomain: 0x0
Nov 15 21:27:18 android3427 kernel: ath: EEPROM indicates default
country code should be used
Nov 15 21:27:18 android3427 kernel: ath: doing EEPROM country->regdmn
map search
Nov 15 21:27:18 android3427 kernel: ath: country maps to regdmn code: 0x3a
Nov 15 21:27:18 android3427 kernel: ath: Country alpha2 being used: US
Nov 15 21:27:18 android3427 kernel: ath: Regpair used: 0x3a
Nov 15 21:27:18 android3427 systemd[1]: Starting Load/Save RF Kill
Switch Status of rfkill1...
Nov 15 21:27:18 android29646 systemd[1]: Started Load/Save RF Kill
Switch Status of rfkill1.
Nov 15 21:27:52 android29646 kernel: wlan0: authenticate with XXX0
Nov 15 21:27:52 android29646 kernel: wlan0: send auth to XXX0 (try 1/3)
Nov 15 21:27:52 android29646 kernel: wlan0: authenticated
Nov 15 21:27:52 android29646 kernel: ath10k_pci 0000:02:00.0 wlan0:
disabling HT as WMM/QoS is not supported by the AP
Nov 15 21:27:52 android29646 kernel: ath10k_pci 0000:02:00.0 wlan0:
disabling VHT as WMM/QoS is not supported by the AP
Nov 15 21:27:52 android29646 kernel: wlan0: associate with XXX0 (try 1/3)
Nov 15 21:27:52 android29646 kernel: wlan0: RX AssocResp from XXX0
(capab=0x11 status=0 aid=1)
Nov 15 21:27:52 android29646 kernel: wlan0: associated
Nov 15 21:27:52 android29646 kernel: wlan0: Limiting TX power to 17 dBm
as advertised by XXX0
Nov 15 21:28:07 android29646 dhclient[2183]: DHCPDISCOVER on wlan0 to
255.255.255.255 port 67 interval 7
Nov 15 21:28:14 android29646 dhclient[2183]: DHCPDISCOVER on wlan0 to
255.255.255.255 port 67 interval 12
Nov 15 21:28:26 android29646 dhclient[2183]: DHCPDISCOVER on wlan0 to
255.255.255.255 port 67 interval 12
Nov 15 21:28:38 android29646 dhclient[2183]: No DHCPOFFERS received.
Nov 15 21:28:38 android29646 dhclient[2183]: No working leases in
persistent database - sleeping.
Nov 15 21:29:09 android29646 dhclient[2244]: DHCPDISCOVER on wlan0 to
255.255.255.255 port 67 interval 4
Nov 15 21:29:13 android29646 dhclient[2244]: DHCPDISCOVER on wlan0 to
255.255.255.255 port 67 interval 10
Nov 15 21:29:23 android29646 dhclient[2244]: DHCPDISCOVER on wlan0 to
255.255.255.255 port 67 interval 9
Nov 15 21:29:32 android29646 dhclient[2244]: DHCPDISCOVER on wlan0 to
255.255.255.255 port 67 interval 8
Nov 15 21:29:40 android29646 dhclient[2244]: No DHCPOFFERS received.
Nov 15 21:29:40 android29646 dhclient[2244]: No working leases in
persistent database - sleeping.
Nov 15 21:30:07 android29646 dhclient[2244]: DHCPDISCOVER on wlan0 to
255.255.255.255 port 67 interval 4
Nov 15 21:30:11 android29646 dhclient[2244]: DHCPDISCOVER on wlan0 to
255.255.255.255 port 67 interval 10
Nov 15 21:30:12 android29646 kernel: wlan0: deauthenticated from XXX0
(Reason: 2=PREV_AUTH_NOT_VALID)
Nov 15 21:30:13 android29646 dhclient[2244]: receive_packet failed on
wlan0: Network is down
Thank you so far, Felix
On 15.11.2016 14:48, Michal Kazior wrote:
> On 15 November 2016 at 13:59, Felix <kramerfe@gmail.com> wrote:
> [...]
>>>> cat /etc/wpa_supplicant/wpa_supplicant.conf
>> ctrl_interface=/var/run/wpa_supplicant
>> network={
>> ssid="eduroam"
>> proto=RSN
>> pairwise=CCMP
>> group=CCMP
>> key_mgmt=WPA-EAP
>> eap=TTLS
>> domain_suffix_match="XXX"
>> phase1="peaplabel=0"
>> anonymous_identity="anonymous@XXX"
>> phase2="auth=PAP"
>> ca_cert="XXX"
>> identity="XXX"
>> password="XXX"
>> }
>>
>>>> wpa_supplicant -i wlan0 -D nl80211 -c
>>>> /etc/wpa_supplicant/wpa_supplicant.conf
>> Successfully initialized wpa_supplicant
>> wlan0: SME: Trying to authenticate with XXX (SSID='eduroam' freq=5240 MHz)
>> wlan0: Trying to associate with XXX (SSID='eduroam' freq=5240 MHz)
>> wlan0: Associated with XXX
>> wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
>> wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21
>> wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected
>> wlan0: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=XXX
>> wlan0: CTRL-EVENT-EAP-PEER-CERT depth=3 subject='XXX'
>> wlan0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='XXX'
>> wlan0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='XXX'
>> wlan0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='XXX'
>> wlan0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
>> wlan0: WPA: Key negotiation completed with XXX [PTK=CCMP GTK=CCMP]
>> wlan0: CTRL-EVENT-CONNECTED - Connection to XXX completed [id=0 id_str=]
>> wlan0: CTRL-EVENT-DISCONNECTED bssid=XXX reason=2
> How long is CONNECTED away from DISCONNECTED? Running with "-t" should
> add timestamps. At this point I would suggest "-ddd" to get verbose
> logs.
>
>
>>>> cat /etc/dhcp/dhclient.conf
>> option rfc3442-classless-static-routes code 121 = array of unsigned integer
>> 8;
>> supersede dhcp-server-identifier 255.255.255.255;
>> request subnet-mask, broadcast-address, time-offset, routers, interface-mtu,
>> rfc3442-classless-static-routes;
>> timeout 30;
>> retry 30;
>>
>>>> journalctl -b | grep dhclient
>> Nov 15 12:32:57 android10278 dhclient[852]: DHCPREQUEST on wlan0 to
>> 255.255.255.255 port 67
> [...]
>>>> tcpdump -i wlan0
>> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
>> listening on wlan0, link-type EN10MB (Ethernet), capture size 262144 bytes
>> 12:26:31.765188 ARP, Request who-has 8.8.8.8 tell 192.168.0.1, length 28
>> 12:26:31.765227 ARP, Request who-has 8.8.4.4 tell 192.168.0.1, length 28
> [...]
>> 12:26:57.181480 EAP packet (0) v2, len 6
>> 12:26:57.192997 EAP packet (0) v2, len 1024
>> 12:26:57.193250 EAP packet (0) v2, len 6
>> 12:26:57.203442 EAP packet (0) v2, len 1024
>> 12:26:57.203690 EAP packet (0) v2, len 6
>> 12:26:57.214876 EAP packet (0) v2, len 461
>> 12:26:57.228167 EAP packet (0) v2, len 140
>> 12:26:57.238101 EAP packet (0) v2, len 69
>> 12:26:57.239395 EAP packet (0) v2, len 144
>> 12:26:57.309948 EAP packet (0) v2, len 4
>> 12:26:57.310261 EAPOL key (3) v2, len 117
>> 12:26:57.314455 EAPOL key (3) v2, len 117
>> 12:26:57.316151 EAPOL key (3) v2, len 151
>> 12:26:57.316485 EAPOL key (3) v2, len 95
> This suggests key exchange has completed.
>
>
>> 12:26:57.379388 IP XXX.152.54.netbios-ns > XXX.155.255.netbios-ns: NBT UDP
>> PACKET(137): QUERY; REQUEST; BROADCAST
>> 12:26:57.388661 IP XXX.154.22.netbios-ns > XXX.155.255.netbios-ns: NBT UDP
>> PACKET(137): QUERY; REQUEST; BROADCAST
> [...]
>> 452 packets captured
>> 8348 packets received by filter
>> 7896 packets dropped by kernel#
> What happened to all the packets? Are you really running just
> "tcpdump" or are you applying pcap filters that you didn't mention?
>
> There are no DHCP requests so either firmware is refusing to transmit
> them OTA, have been filtered by kernel/tcpdump or you have some
> firewall rule that drops the packets. Tcpdump does report some traffic
> which I infer is just Rx suggesting crypto is (at least partially) set
> up. Is there something you're not telling about your setup?
>
> Can you load ath10k_core with debug_mask=0xffffff3f and provide logs?
>
>
> Michał
>
_______________________________________________
ath10k mailing list
ath10k@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/ath10k
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: Connection Problems with on QCA9880-BR4A
2016-11-15 22:42 ` Felix
@ 2016-11-18 15:18 ` Michal Kazior
0 siblings, 0 replies; 6+ messages in thread
From: Michal Kazior @ 2016-11-18 15:18 UTC (permalink / raw)
To: Felix; +Cc: ath10k@lists.infradead.org
On 15 November 2016 at 23:42, Felix <kramerfe@gmail.com> wrote:
> Hi,
>
> Connected is usually a few minutes away from dsiconnected. I am running
> tcpdump without pcap filters. Here are my iptables and udev rules. If I use
> the SR71 everything works fine therefore I doubt it has anything to do with
> these.
[...]
> The option debug_mask=0xffffff3f does not give me any addidtional entries in
> dmesg or journalctl. I also tried "modprobe ath10k_core
> debug_mask=0xffffffff" with the same result and shows the debug_mask value
> seems properly set:
>>> cat /sys/module/ath10k_core/parameters/debug_mask
> 4294967295
>>> python -c 'print "%i" % 0xffffffff'
> 4294967295
[...]
>>> journalctl
[...]
> Nov 15 21:27:17 android3427 kernel: ath10k_pci 0000:02:00.0: qca988x hw2.0
> target 0x4100016c chip_id 0x043202ff sub 19b6:d03c
> Nov 15 21:27:17 android3427 kernel: ath10k_pci 0000:02:00.0: kconfig debug 0
> debugfs 0 tracing 0 dfs 0 testmode 0
[...]
Your driver is compiled without debug prints which explains why you're
not seeing any difference after setting debug_mask. You'll need to
recompile for that.
[...]
> Nov 15 21:27:52 android29646 kernel: wlan0: authenticate with XXX0
> Nov 15 21:27:52 android29646 kernel: wlan0: send auth to XXX0 (try 1/3)
> Nov 15 21:27:52 android29646 kernel: wlan0: authenticated
> Nov 15 21:27:52 android29646 kernel: ath10k_pci 0000:02:00.0 wlan0:
> disabling HT as WMM/QoS is not supported by the AP
> Nov 15 21:27:52 android29646 kernel: ath10k_pci 0000:02:00.0 wlan0:
> disabling VHT as WMM/QoS is not supported by the AP
Your AP doesn't even HT nor VHT nor WMM enabled. Is this expected?
> Nov 15 21:27:52 android29646 kernel: wlan0: associate with XXX0 (try 1/3)
> Nov 15 21:27:52 android29646 kernel: wlan0: RX AssocResp from XXX0
> (capab=0x11 status=0 aid=1)
> Nov 15 21:27:52 android29646 kernel: wlan0: associated
> Nov 15 21:27:52 android29646 kernel: wlan0: Limiting TX power to 17 dBm as
> advertised by XXX0
[...]
> Nov 15 21:30:12 android29646 kernel: wlan0: deauthenticated from XXX0
> (Reason: 2=PREV_AUTH_NOT_VALID)
It seems AP is kicking you out. EAP likely didn't complete up all the
way and a timeout on AP is triggered.
I suspect lack of QoS is source of cofusion here. Either driver is
requesting firmware to use wrong tid or firmware tries to be clever
and ends up using wrong hardware queue where the final EAPOL gets
stuck and is never transmitted. That's just a guess though.
Driver dumps (debug_mask=0xffffffff actually) would be really useful here.
Michał
_______________________________________________
ath10k mailing list
ath10k@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/ath10k
^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2016-11-18 15:19 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-11-11 12:07 Connection Problems with on QCA9880-BR4A Felix
2016-11-14 7:56 ` Michal Kazior
2016-11-15 12:59 ` Felix
2016-11-15 13:48 ` Michal Kazior
2016-11-15 22:42 ` Felix
2016-11-18 15:18 ` Michal Kazior
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.