* Re: brcmfmac SAE/WPA3 negotiation - Part 2
[not found] ` <CAG17S_OigLj3j=tS2BKYpoKOWKVs=XOBS-YFn26SzF9r+ZpLzA@mail.gmail.com>
@ 2025-01-25 16:37 ` KeithG
2025-01-27 14:28 ` James Prestwood
0 siblings, 1 reply; 7+ messages in thread
From: KeithG @ 2025-01-25 16:37 UTC (permalink / raw)
To: Denis Kenzior
Cc: Arend Van Spriel, James Prestwood, connman, brcm80211,
linux-wireless, iwd
[-- Attachment #1: Type: text/plain, Size: 7950 bytes --]
Still trying to pinpoint what is happening when it works versus when
it does not.
Using iwd 3.3 (built from git at gbf82aff0) with connman (1.41-1.43)
will negotiate a successful WPA3/SAE AP connection some times. When it
fails, it generally (maybe always?) gets an APIPA address and does not
negotiate getting a DHCP address.
When I compare the logs side by side, I see that when it sets the
APIPA address it shows:
Jan 22 19:44:36 Pi4 iwd[2259036]: event: connect-info, FullMAC
driver: brcmfmac using SAE. Expect EXTERNAL_AUTH
Jan 22 19:44:36 Pi4 iwd[2259036]: src/pmksa.c:pmksa_cache_get()
Returning entry with PMKID: dc1225e288927453b9879a01d47d7af5
Jan 22 19:44:36 Pi4 iwd[2259036]: src/netdev.c:netdev_connect_common()
Skipping SAE by using PMKSA cache
Jan 22 19:44:36 Pi4 iwd[2259036]: src/netdev.c:netdev_cqm_rssi_update()
Jan 22 19:44:36 Pi4 iwd[2259036]:
src/wiphy.c:wiphy_radio_work_insert() Inserting work item 15
Jan 22 19:44:36 Pi4 iwd[2259036]: src/wiphy.c:wiphy_radio_work_next()
Starting work item 15
Jan 22 19:44:36 Pi4 iwd[2259036]: event: connect-info, ssid: deskSAE,
bss: d8:3a:dd:60:a3:0c, signal: -59, load: 0/255
Jan 22 19:44:36 Pi4 iwd[2259036]: event: state, old: disconnected,
new: connecting
then later, it has this:
Jan 22 19:44:36 Pi4 kernel: ieee80211 phy0:
brcmf_cfg80211_external_auth: External authentication failed: status=1
this line is always there when it does not negotiate DHCP.
whereas when it sets up correctly with a DHCP address, it does this:
Jan 22 19:57:56 Pi4 iwd[2259036]: event: connect-info, FullMAC driver:
brcmfmac using SAE. Expect EXTERNAL_AUTH
Jan 22 19:57:56 Pi4 iwd[2259036]: src/netdev.c:netdev_cqm_rssi_update()
Jan 22 19:57:56 Pi4 iwd[2259036]:
src/wiphy.c:wiphy_radio_work_insert() Inserting work item 17
Jan 22 19:57:56 Pi4 iwd[2259036]: src/wiphy.c:wiphy_radio_work_next()
Starting work item 17
Jan 22 19:57:56 Pi4 iwd[2259036]: event: connect-info, ssid: deskSAE,
bss: d8:3a:dd:60:a3:0c, signal: -59, load: 0/255
Jan 22 19:57:56 Pi4 iwd[2259036]: event: state, old: disconnected,
new: connecting
what I am doing to repeatedly test this is to remove the config for
the WPA3 AP via connmanctl and re-initiate the connection
The attached logs are of iwmon and the journal showing a successful
DHCP connection and an unsuccessful APIPA connection.
Is this still a problem with the driver/firmware, or of iwd? When I
use wpa_supplicant 2.10-12+deb12u2 with connman, it connects properly
every time. If needed, I also have logs of a successful wpa_supplicant
connection. It looks a lot like the successful iwd connection.
The only difference in the iwmon logs between a successful iwd
connection and a wpa_supplicant connection (to my untrained eyes) is
that it has different IFLA flags
iwd:
> RTNL: New Link (0x10) len 128 9.038969
Flags: 0 (0x000)
Sequence number: 0 (0x00000000)
Port ID: 0
IFLA Family: Unknown
IFLA Type: 1
IFLA Index: 3
IFLA ChangeMask: 0
IFLA Flags: (0x1043) [up,broadcast,running,multicast]
wpa_supplicant
> RTNL: New Link (0x10) len 136 48.126129
Flags: 0 (0x000)
Sequence number: 0 (0x00000000)
Port ID: 0
IFLA Family: Unknown
IFLA Type: 1
IFLA Index: 3
IFLA ChangeMask: 0
IFLA Flags: (0x9003) [up,broadcast,multicast,dynamic]
These logs have been trimmed and I hope I have the relevant bits.
Keith
On Thu, Jan 9, 2025 at 8:19 PM KeithG <ys3al35l@gmail.com> wrote:
>
> On Mon, Jan 6, 2025 at 11:13 AM KeithG <ys3al35l@gmail.com> wrote:
> >
> > On Mon, Jan 6, 2025 at 9:26 AM Denis Kenzior <denkenz@gmail.com> wrote:
> > >
> > > Hi Keith,
> > >
> > > On 1/5/25 6:41 PM, KeithG wrote:
> > > > I am looking at the iwmon logs for a successful wpa_supplicant
> > > > connection versus one from IWD. Both connect and both pass data and
> > > > both grab a DHCP address. I do note one difference in the connection,
> > > > though.
> > > >
> > > > Request : Connect
> > > > through the responses RTNL
> > > > wpa_supplicant knows it is dynamic
> > >
> > > wpa_supplicant doesn't manage network interfaces. I assume you're using ConnMan
> > > for this? If so, ConnMan sets the IFF_DYNAMIC flag. See
> > > https://git.kernel.org/pub/scm/network/connman/connman.git/tree/src/inet.c#n372
> > >
> > > >
> > > > Whereas the iwd log does not:
> > >
> > > iwd doesn't use IFF_DYNAMIC in its DHCP implementation at the moment.
> > >
> > > According to 'man netdevice':
> > >
> > > IFF_DYNAMIC The addresses are lost when the interface
> > > goes down.
> > >
> > > I doubt this is the cause of your DHCP / connection problems.
> > >
> > > Regards,
> > > -Denis
> >
> > Denis,
> >
> > I am using connman to manage the connections. The connman config is
> > the same. The one iwmon snippet was with iwd masked and stopped but
> > wpa_supplicant installed and the connect performed in connmanctl. The
> > other is with wpa_supplicant removed and purged and iwd started,
> > running then restarted connman then initiated a connect form
> > connmanctl.
> >
> > I pored over these logs yesterday and saw a few differences, but this
> > was one that stood out. I can look closer again tonight and see if I
> > notice anything else that I can summarize.
> >
> > Keith
>
> Still looking at these iwmon logs. The attached log is the log of
> using wpa_supplicant under connman to make a valid connection but w/o
> all the AP scanning...
>
> using wpa_supplicant with connman works every time. It is with iwd
> that I get varying behavior. Looking through the iwmon logs to see
> what is sent and what is received, it looks like there are some
> differences. I am guessing that the first '< Request: Connect' is what
> is sent to the AP to request a connection.
> wpa_supplicant sends more info:
> Under < Request: Connect'
> 'RSN capabilities: bit 6: Management Frame Protection Required
> ...
> BIP (00:0f:ac) suite 06
> 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
> ac 08 c0 00 00 00 00 0f ac 06
> ...
> Extended Capabilities: len 11
> Capability: bit 17: WNM-Sleep mode
> ...
> Capability: bit 25: SSID list
> Capability: bit 46: WNM- Notification
> Capability: bit 54: SCS
> ...
> Then the < Request: Frame (0x3b), iwd never increments its Sequence
> number. It always stays at 0 whereas wpa_supplicant starts its
> sequence at 1
> Also, wpa_supplincant has this flag set:
> < Request: Frame (0x3b) len 80 [ack] 14.502956
> ...
> Don't Wait for Ack: true
> ...
> Error decoding Supported rates IE len 0: Invalid
> argument (-22)
> Tag 92: len 7
> 56 16 6f 94 3f 4d d9
> V.o.?M.
>
> With wpa_supplincant, before the AP sends the 'PAE:', we get this
> which is not in any of the iwmon logs with iwd:
> < Request: Set PMKSA (0x34) len 92 [ack] 14.561627
> Interface Index: 3 (0x00000003)
> PMKID: len 16
> 05 cb 9d 0d 9a c6 7c 42 77 b5 d2 23 f0 62 f7 4d ......|Bw..#.b.M
> MAC Address D8:3A:DD:60:A3:0C
> Unknown: 287 len 4
> c0 a8 00 00 ....
> Unknown: 288 len 1
> 46 F
> PMK: 254 len 32
> 35 28 07 cb 94 de 82 e7 0a 5c 73 d3 e4 1f 88 ae 5(.......\s.....
> 74 84 82 66 86 8d b5 aa 79 cb 75 d9 75 8d da 3a t..f....y.u.u..:
> > Response: Set PMKSA (0x34) len 4 [0x100] 14.562171
> Status: Success (0)
>
> Is there any more info or help I can provide?
[-- Attachment #2: iwd_dhcp_iwmon.txt --]
[-- Type: text/plain, Size: 40981 bytes --]
< Request: Set CQM (0x3f) len 28 [ack] 8.950373
Interface Index: 3 (0x00000003)
CQM: len 16
RSSI thresholds:
Threshold: -70
RSSI hysteresis: 5 (0x00000005)
> Response: Set CQM (0x3f) len 4 8.950405
Status: Operation not supported (95)
< Request: Connect (0x2e) len 148 [ack] 8.950461
Interface Index: 3 (0x00000003)
Wiphy Frequency: 2412 (0x0000096c)
MAC Address D8:3A:DD:60:A3:0C
SSID: len 7
64 65 73 6b 53 41 45 deskSAE
Auth Type: 4 (0x00000004)
External Auth Support: 261 len 0
Privacy: true
Socket Owns Interface/Connection: true
Cipher Suites Pairwise:
CCMP (00:0f:ac) suite 04
Cipher Suite Group: CCMP (00:0f:ac) suite 04
Use MFP: 1 (0x00000001)
AKM Suites:
SAE/PMKSA caching SHA256; RSNA PMKSA caching SHA256/mesh peering exchange (00:0f:ac) suite 08
WPA Versions: 4 (0x00000004)
Control Port: true
Information Elements: len 38
RSN:
Group Data Cipher Suite: len 4
CCMP (00:0f:ac) suite 04
Pairwise Cipher Suite: len 4
CCMP (00:0f:ac) suite 04
AKM Suite: len 4
SAE/PMKSA caching SHA256; RSNA PMKSA caching SHA256/mesh peering exchange (00:0f:ac) suite 08
RSN capabilities: bits 2 - 3: 1 replay counter per PTKSA
RSN capabilities: bits 4 - 5: 1 replay counter per GTKSA
RSN capabilities: bit 7: Management Frame Protection Capable
01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
ac 08 80 00 ....
Extended Capabilities: len 10
Capability: bit 19: BSS transition
00 00 08 00 00 00 00 00 00 01 ..........
Tag 262: len 1
1a .
> Response: Connect (0x2e) len 4 [0x100] 8.957665
Status: Success (0)
> Event: External Auth (0x7f) len 56 8.981705
Wiphy: 0 (0x00000000)
Interface Index: 3 (0x00000003)
AKM Suites:
unknown (08:ac:0f) suite 00 (unknown)
External Auth Action: 260 len 4
00 00 00 00 ....
BSSID D8:3A:DD:60:A3:0C
SSID: len 7
64 65 73 6b 53 41 45 deskSAE
< Request: Frame (0x3b) len 140 [ack] 8.992485
Interface Index: 3 (0x00000003)
Frame: len 128
Frame Type: 0x00b0
Type: Management (0)
Authentication:
Frame Control: protocol: 00 type: 00 subtype: 11 to: 00 from: 00 more_frags: 00
retry: 00 power_mgmt: 00 more_data: 00 protected: 00 order: 00
Duration: 0
Address 1 (RA): D8:3A:DD:60:A3:0C
Address 2 (TA): DC:A6:32:B4:50:CF
Address 3: D8:3A:DD:60:A3:0C
Fragment Number: 0
Sequence Number: 0
Algorithm: SAE (seq: 1, status: 0)
b0 00 00 00 d8 3a dd 60 a3 0c dc a6 32 b4 50 cf .....:.`....2.P.
d8 3a dd 60 a3 0c 00 00 03 00 01 00 00 00 13 00 .:.`............
90 6a b5 c5 a2 14 2c d0 5f 7d 46 a6 97 7c 2d 5d .j....,._}F..|-]
1e 17 2a 99 04 d0 c8 6b a0 9e 22 7e 0c 0d a4 02 ..*....k.."~....
23 e7 88 5d 73 0f 11 b7 c6 c8 e0 fe 4c 58 ce fe #..]s.......LX..
1e 25 ba 67 51 fe 3a 7e 88 24 4f 6f 6c a6 67 17 .%.gQ.:~.$Ool.g.
1a c7 1d 2d 0f de 57 e3 a2 09 6a d2 99 62 6f 61 ...-..W...j..boa
1f 99 71 f9 bf f5 bc 0b 4d 20 1a 94 e2 37 d0 25 ..q.....M ...7.%
> Event: Frame TX Status (0x3c) len 176 8.994818
Wiphy: 0 (0x00000000)
Interface Index: 3 (0x00000003)
Wireless Device: 1 (0x0000000000000001)
Frame: len 128
Frame Type: 0x00b0
Type: Management (0)
Authentication:
Frame Control: protocol: 00 type: 00 subtype: 11 to: 00 from: 00 more_frags: 00
retry: 00 power_mgmt: 00 more_data: 00 protected: 00 order: 00
Duration: 0
Address 1 (RA): D8:3A:DD:60:A3:0C
Address 2 (TA): DC:A6:32:B4:50:CF
Address 3: D8:3A:DD:60:A3:0C
Fragment Number: 0
Sequence Number: 0
Algorithm: SAE (seq: 1, status: 0)
b0 00 00 00 d8 3a dd 60 a3 0c dc a6 32 b4 50 cf .....:.`....2.P.
d8 3a dd 60 a3 0c 00 00 03 00 01 00 00 00 13 00 .:.`............
90 6a b5 c5 a2 14 2c d0 5f 7d 46 a6 97 7c 2d 5d .j....,._}F..|-]
1e 17 2a 99 04 d0 c8 6b a0 9e 22 7e 0c 0d a4 02 ..*....k.."~....
23 e7 88 5d 73 0f 11 b7 c6 c8 e0 fe 4c 58 ce fe #..]s.......LX..
1e 25 ba 67 51 fe 3a 7e 88 24 4f 6f 6c a6 67 17 .%.gQ.:~.$Ool.g.
1a c7 1d 2d 0f de 57 e3 a2 09 6a d2 99 62 6f 61 ...-..W...j..boa
1f 99 71 f9 bf f5 bc 0b 4d 20 1a 94 e2 37 d0 25 ..q.....M ...7.%
Cookie: 0 (0x0000000000000000)
ACK: true
> Result: Frame (0x3b) len 12 8.994832
Cookie: 0 (0x0000000000000000)
> Response: Frame (0x3b) len 4 [0x100] 8.994838
Status: Success (0)
> Event: Frame (0x3b) len 184 8.998323
Wiphy: 0 (0x00000000)
Interface Index: 3 (0x00000003)
Wireless Device: 1 (0x0000000000000001)
Wiphy Frequency: 2412 (0x0000096c)
Unknown: 290 len 4
00 00 00 00 ....
Frame: len 128
Frame Type: 0x00b0
Type: Management (0)
Authentication:
Frame Control: protocol: 00 type: 00 subtype: 11 to: 00 from: 00 more_frags: 00
retry: 00 power_mgmt: 00 more_data: 00 protected: 00 order: 00
Duration: 0
Address 1 (RA): DC:A6:32:B4:50:CF
Address 2 (TA): D8:3A:DD:60:A3:0C
Address 3: 00:00:00:00:00:00
Fragment Number: 0
Sequence Number: 0
Algorithm: SAE (seq: 1, status: 0)
b0 00 00 00 dc a6 32 b4 50 cf d8 3a dd 60 a3 0c ......2.P..:.`..
00 00 00 00 00 00 00 00 03 00 01 00 00 00 13 00 ................
f5 98 4d 58 4a ab 07 b0 94 42 17 f2 b1 4d 61 32 ..MXJ....B...Ma2
62 77 37 25 03 1a fa 60 4f 42 ba 7c 5f 03 8e 47 bw7%...`OB.|_..G
6e 70 c5 f5 53 d2 48 1e 3e cf a8 6a 57 61 4f 15 np..S.H.>..jWaO.
a2 8a 95 b4 aa 91 79 3c 43 ec d7 b2 f7 db 1f 4a ......y<C......J
00 73 92 20 13 65 a2 82 fd 80 bf 3f d2 9d a2 6e .s. .e.....?...n
ae 20 d5 fa 3e 3c 79 f9 61 cb 24 28 c1 af f9 6d . ..><y.a.$(...m
RX Management Flags: 2 (0x00000002)
< Request: Frame (0x3b) len 76 [ack] 9.001658
Interface Index: 3 (0x00000003)
Frame: len 64
Frame Type: 0x00b0
Type: Management (0)
Authentication:
Frame Control: protocol: 00 type: 00 subtype: 11 to: 00 from: 00 more_frags: 00
retry: 00 power_mgmt: 00 more_data: 00 protected: 00 order: 00
Duration: 0
Address 1 (RA): D8:3A:DD:60:A3:0C
Address 2 (TA): DC:A6:32:B4:50:CF
Address 3: D8:3A:DD:60:A3:0C
Fragment Number: 0
Sequence Number: 0
Algorithm: SAE (seq: 2, status: 0)
IEs: len 34
Error decoding Supported rates IE len 0: Invalid argument (-22)
b0 00 00 00 d8 3a dd 60 a3 0c dc a6 32 b4 50 cf .....:.`....2.P.
d8 3a dd 60 a3 0c 00 00 03 00 02 00 00 00 01 00 .:.`............
88 ef eb 55 73 42 11 0a 03 3b 6a 58 fb 6f 66 15 ...UsB...;jX.of.
82 f6 a7 b5 11 5a 0e 9e 72 ff 46 b8 bc 40 1b 39 .....Z..r.F..@.9
> Event: Frame TX Status (0x3c) len 112 9.004944
Wiphy: 0 (0x00000000)
Interface Index: 3 (0x00000003)
Wireless Device: 1 (0x0000000000000001)
Frame: len 64
Frame Type: 0x00b0
Type: Management (0)
Authentication:
Frame Control: protocol: 00 type: 00 subtype: 11 to: 00 from: 00 more_frags: 00
retry: 00 power_mgmt: 00 more_data: 00 protected: 00 order: 00
Duration: 0
Address 1 (RA): D8:3A:DD:60:A3:0C
Address 2 (TA): DC:A6:32:B4:50:CF
Address 3: D8:3A:DD:60:A3:0C
Fragment Number: 0
Sequence Number: 0
Algorithm: SAE (seq: 2, status: 0)
IEs: len 34
Error decoding Supported rates IE len 0: Invalid argument (-22)
b0 00 00 00 d8 3a dd 60 a3 0c dc a6 32 b4 50 cf .....:.`....2.P.
d8 3a dd 60 a3 0c 00 00 03 00 02 00 00 00 01 00 .:.`............
88 ef eb 55 73 42 11 0a 03 3b 6a 58 fb 6f 66 15 ...UsB...;jX.of.
82 f6 a7 b5 11 5a 0e 9e 72 ff 46 b8 bc 40 1b 39 .....Z..r.F..@.9
Cookie: 0 (0x0000000000000000)
ACK: true
> Result: Frame (0x3b) len 12 9.004955
Cookie: 0 (0x0000000000000000)
> Response: Frame (0x3b) len 4 [0x100] 9.004960
Status: Success (0)
> Event: Frame (0x3b) len 120 9.006097
Wiphy: 0 (0x00000000)
Interface Index: 3 (0x00000003)
Wireless Device: 1 (0x0000000000000001)
Wiphy Frequency: 2412 (0x0000096c)
Unknown: 290 len 4
00 00 00 00 ....
Frame: len 64
Frame Type: 0x00b0
Type: Management (0)
Authentication:
Frame Control: protocol: 00 type: 00 subtype: 11 to: 00 from: 00 more_frags: 00
retry: 00 power_mgmt: 00 more_data: 00 protected: 00 order: 00
Duration: 0
Address 1 (RA): DC:A6:32:B4:50:CF
Address 2 (TA): D8:3A:DD:60:A3:0C
Address 3: 00:00:00:00:00:00
Fragment Number: 0
Sequence Number: 0
Algorithm: SAE (seq: 2, status: 0)
IEs: len 34
Error decoding Supported rates IE len 0: Invalid argument (-22)
b0 00 00 00 dc a6 32 b4 50 cf d8 3a dd 60 a3 0c ......2.P..:.`..
00 00 00 00 00 00 00 00 03 00 02 00 00 00 01 00 ................
b1 52 e7 57 f0 0f 35 37 c9 db ef 96 f2 d6 33 e4 .R.W..57......3.
b2 94 ac ea 71 a8 af 27 85 5d 9b d6 fb cb a7 04 ....q..'.]......
RX Management Flags: 2 (0x00000002)
< Request: External Auth (0x7f) len 40 [ack] 9.006319
Interface Index: 3 (0x00000003)
Status Code: 0 (0x0000)
SSID: len 7
64 65 73 6b 53 41 45 deskSAE
BSSID D8:3A:DD:60:A3:0C
> Response: External Auth (0x7f) len 4 [0x100] 9.006934
Status: Success (0)
> PAE: len 121 9.011410
Interface Index: 3
EAPoL: len 121
Protocol Version: 2 (802.1X-2004)
Type: 3 (Key)
Length: 117
Descriptor Type: 2
Key MIC: false
Secure: false
Error: false
Request: false
Encrypted Key Data: false
SMK Message: false
Key Descriptor Version: 0 (00)
Key Type: true
Install: false
Key ACK: true
Key Length: 16
Key Replay Counter: 1
Key NONCE
69 e3 46 27 40 86 15 c1 c4 ac f2 10 e7 6e 7f 40 i.F'@........n.@
91 72 93 f6 a3 25 c7 4c a5 63 2d 9f 06 26 92 30 .r...%.L.c-..&.0
Key IV
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
Key RSC
00 00 00 00 00 00 00 00 ........
Key MIC Data
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
Key Data: len 22
Vendor specific: len 20
IEEE 802.11 (00:0f:ac) type: 04
PMKID KDE
00 0f ac 04 86 03 03 1e ec bf 34 7f f3 bf 5e 99 ..........4...^.
48 c9 8e 8f H...
02 03 00 75 02 00 88 00 10 00 00 00 00 00 00 00 ...u............
01 69 e3 46 27 40 86 15 c1 c4 ac f2 10 e7 6e 7f .i.F'@........n.
40 91 72 93 f6 a3 25 c7 4c a5 63 2d 9f 06 26 92 @.r...%.L.c-..&.
30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0...............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 16 dd 14 00 0f ac 04 86 03 03 1e ec bf 34 ...............4
7f f3 bf 5e 99 48 c9 8e 8f ...^.H...
> Event: Connect (0x2e) len 156 9.038941
Wiphy: 0 (0x00000000)
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
Status Code: 0 (0x0000)
Request IE: len 80
SSID: deskSAE
64 65 73 6b 53 41 45 deskSAE
Supported rates:
1.0(B) 2.0(B) 5.5(B) 11.0(B) 18.0 24.0 36.0 54.0 Mbit/s
82 84 8b 96 24 30 48 6c ....$0Hl
Extended supported rates:
6.0 9.0 12.0 48.0 Mbit/s
0c 12 18 60 ...`
Tag 33: len 2
03 14 ..
Tag 36: len 2
01 0b ..
RSN:
Group Data Cipher Suite: len 4
CCMP (00:0f:ac) suite 04
Pairwise Cipher Suite: len 4
CCMP (00:0f:ac) suite 04
AKM Suite: len 4
SAE/PMKSA caching SHA256; RSNA PMKSA caching SHA256/mesh peering exchange (00:0f:ac) suite 08
RSN capabilities: bits 2 - 3: 1 replay counter per PTKSA
RSN capabilities: bits 4 - 5: 1 replay counter per GTKSA
RSN capabilities: bit 7: Management Frame Protection Capable
01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
ac 08 80 00 ....
Extended Capabilities: len 8
Capability: bit 62: Opmode Notification
00 00 00 00 00 00 00 40 .......@
Vendor specific: len 9
Broadcom (00:10:18) type: 02
00 10 18 02 00 00 10 00 00 .........
SSID:
SSID:
Response IE: len 32
Supported rates:
1.0(B) 2.0(B) 5.5(B) 11.0(B) 6.0 9.0 12.0 18.0 Mbit/s
82 84 8b 96 0c 12 18 24 .......$
Extended supported rates:
24.0 36.0 48.0 54.0 Mbit/s
30 48 60 6c 0H`l
Extended Capabilities: len 8
Capability: bit 2: Extended channel switching
Capability: bit 62: Opmode Notification
04 00 00 00 00 00 00 40 .......@
> RTNL: New Link (0x10) len 128 9.038969
Flags: 0 (0x000)
Sequence number: 0 (0x00000000)
Port ID: 0
IFLA Family: Unknown
IFLA Type: 1
IFLA Index: 3
IFLA ChangeMask: 0
IFLA Flags: (0x1043) [up,broadcast,running,multicast]
IfName (len:6): wlan0
Wireless: len 96
60 00 07 8c 00 00 00 00 50 00 00 00 00 00 00 00 `.......P.......
00 07 64 65 73 6b 53 41 45 01 08 82 84 8b 96 24 ..deskSAE......$
30 48 6c 32 04 0c 12 18 60 21 02 03 14 24 02 01 0Hl2....`!...$..
0b 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 .0..............
00 00 0f ac 08 80 00 7f 08 00 00 00 00 00 00 00 ................
40 dd 09 00 10 18 02 00 00 10 00 00 00 00 00 00 @...............
> RTNL: New Link (0x10) len 128 9.038975
Flags: 0 (0x000)
Sequence number: 0 (0x00000000)
Port ID: 0
IFLA Family: Unknown
IFLA Type: 1
IFLA Index: 3
IFLA ChangeMask: 0
IFLA Flags: (0x1043) [up,broadcast,running,multicast]
IfName (len:6): wlan0
Wireless: len 96
60 00 07 8c 00 00 00 00 50 00 00 00 00 00 00 00 `.......P.......
00 07 64 65 73 6b 53 41 45 01 08 82 84 8b 96 24 ..deskSAE......$
30 48 6c 32 04 0c 12 18 60 21 02 03 14 24 02 01 0Hl2....`!...$..
0b 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 .0..............
00 00 0f ac 08 80 00 7f 08 00 00 00 00 00 00 00 ................
40 dd 09 00 10 18 02 00 00 10 00 00 00 00 00 00 @...............
> RTNL: New Link (0x10) len 128 9.038981
Flags: 0 (0x000)
Sequence number: 0 (0x00000000)
Port ID: 0
IFLA Family: Unknown
IFLA Type: 1
IFLA Index: 3
IFLA ChangeMask: 0
IFLA Flags: (0x1043) [up,broadcast,running,multicast]
IfName (len:6): wlan0
Wireless: len 96
60 00 07 8c 00 00 00 00 50 00 00 00 00 00 00 00 `.......P.......
00 07 64 65 73 6b 53 41 45 01 08 82 84 8b 96 24 ..deskSAE......$
30 48 6c 32 04 0c 12 18 60 21 02 03 14 24 02 01 0Hl2....`!...$..
0b 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 .0..............
00 00 0f ac 08 80 00 7f 08 00 00 00 00 00 00 00 ................
40 dd 09 00 10 18 02 00 00 10 00 00 00 00 00 00 @...............
> RTNL: New Link (0x10) len 128 9.038987
Flags: 0 (0x000)
Sequence number: 0 (0x00000000)
Port ID: 0
IFLA Family: Unknown
IFLA Type: 1
IFLA Index: 3
IFLA ChangeMask: 0
IFLA Flags: (0x1043) [up,broadcast,running,multicast]
IfName (len:6): wlan0
Wireless: len 96
60 00 07 8c 00 00 00 00 50 00 00 00 00 00 00 00 `.......P.......
00 07 64 65 73 6b 53 41 45 01 08 82 84 8b 96 24 ..deskSAE......$
30 48 6c 32 04 0c 12 18 60 21 02 03 14 24 02 01 0Hl2....`!...$..
0b 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 .0..............
00 00 0f ac 08 80 00 7f 08 00 00 00 00 00 00 00 ................
40 dd 09 00 10 18 02 00 00 10 00 00 00 00 00 00 @...............
> RTNL: New Link (0x10) len 80 9.039014
Flags: 0 (0x000)
Sequence number: 0 (0x00000000)
Port ID: 0
IFLA Family: Unknown
IFLA Type: 1
IFLA Index: 3
IFLA ChangeMask: 0
IFLA Flags: (0x1043) [up,broadcast,running,multicast]
IfName (len:6): wlan0
Wireless: len 48
30 00 08 8c 00 00 00 00 20 00 00 00 00 00 00 00 0....... .......
01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c .........$2.0H`l
7f 08 04 00 00 00 00 00 00 40 82 84 8b 96 24 30 .........@....$0
> RTNL: New Link (0x10) len 80 9.039019
Flags: 0 (0x000)
Sequence number: 0 (0x00000000)
Port ID: 0
IFLA Family: Unknown
IFLA Type: 1
IFLA Index: 3
IFLA ChangeMask: 0
IFLA Flags: (0x1043) [up,broadcast,running,multicast]
IfName (len:6): wlan0
Wireless: len 48
30 00 08 8c 00 00 00 00 20 00 00 00 00 00 00 00 0....... .......
01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c .........$2.0H`l
7f 08 04 00 00 00 00 00 00 40 82 84 8b 96 24 30 .........@....$0
> RTNL: New Link (0x10) len 80 9.039022
Flags: 0 (0x000)
Sequence number: 0 (0x00000000)
Port ID: 0
IFLA Family: Unknown
IFLA Type: 1
IFLA Index: 3
IFLA ChangeMask: 0
IFLA Flags: (0x1043) [up,broadcast,running,multicast]
IfName (len:6): wlan0
Wireless: len 48
30 00 08 8c 00 00 00 00 20 00 00 00 00 00 00 00 0....... .......
01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c .........$2.0H`l
7f 08 04 00 00 00 00 00 00 40 82 84 8b 96 24 30 .........@....$0
> RTNL: New Link (0x10) len 80 9.039024
Flags: 0 (0x000)
Sequence number: 0 (0x00000000)
Port ID: 0
IFLA Family: Unknown
IFLA Type: 1
IFLA Index: 3
IFLA ChangeMask: 0
IFLA Flags: (0x1043) [up,broadcast,running,multicast]
IfName (len:6): wlan0
Wireless: len 48
30 00 08 8c 00 00 00 00 20 00 00 00 00 00 00 00 0....... .......
01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c .........$2.0H`l
7f 08 04 00 00 00 00 00 00 40 82 84 8b 96 24 30 .........@....$0
> RTNL: New Link (0x10) len 56 9.039028
Flags: 0 (0x000)
Sequence number: 0 (0x00000000)
Port ID: 0
IFLA Family: Unknown
IFLA Type: 1
IFLA Index: 3
IFLA ChangeMask: 0
IFLA Flags: (0x1043) [up,broadcast,running,multicast]
IfName (len:6): wlan0
Wireless: len 24
18 00 15 8b 00 00 00 00 01 00 d8 3a dd 60 a3 0c ...........:.`..
00 00 00 00 00 00 00 00 ........
> RTNL: New Link (0x10) len 56 9.039031
Flags: 0 (0x000)
Sequence number: 0 (0x00000000)
Port ID: 0
IFLA Family: Unknown
IFLA Type: 1
IFLA Index: 3
IFLA ChangeMask: 0
IFLA Flags: (0x1043) [up,broadcast,running,multicast]
IfName (len:6): wlan0
Wireless: len 24
18 00 15 8b 00 00 00 00 01 00 d8 3a dd 60 a3 0c ...........:.`..
00 00 00 00 00 00 00 00 ........
> RTNL: New Link (0x10) len 56 9.039033
Flags: 0 (0x000)
Sequence number: 0 (0x00000000)
Port ID: 0
IFLA Family: Unknown
IFLA Type: 1
IFLA Index: 3
IFLA ChangeMask: 0
IFLA Flags: (0x1043) [up,broadcast,running,multicast]
IfName (len:6): wlan0
Wireless: len 24
18 00 15 8b 00 00 00 00 01 00 d8 3a dd 60 a3 0c ...........:.`..
00 00 00 00 00 00 00 00 ........
> RTNL: New Link (0x10) len 56 9.039036
Flags: 0 (0x000)
Sequence number: 0 (0x00000000)
Port ID: 0
IFLA Family: Unknown
IFLA Type: 1
IFLA Index: 3
IFLA ChangeMask: 0
IFLA Flags: (0x1043) [up,broadcast,running,multicast]
IfName (len:6): wlan0
Wireless: len 24
18 00 15 8b 00 00 00 00 01 00 d8 3a dd 60 a3 0c ...........:.`..
00 00 00 00 00 00 00 00 ........
< Request: Get Interface (0x05) len 8 [ack] 9.039049
Interface Index: 3 (0x00000003)
> Result: New Interface (0x07) len 136 9.040544
Interface Index: 3 (0x00000003)
Interface Name: wlan0
Wiphy: 0 (0x00000000)
Interface Type: 2 (0x00000002)
Wireless Device: 1 (0x0000000000000001)
MAC Address DC:A6:32:B4:50:CF
Generation: 5 (0x00000005)
4-Address: 0 (0x00)
Wiphy Frequency: 2412 (0x0000096c)
Unknown: 290 len 4
00 00 00 00 ....
Wiphy Channel Type: 1 (0x00000001)
Channel Width: 1 (0x00000001)
Center Frequency 1: 2412 (0x0000096c)
Wiphy TX Power Level: 3100 (0x00000c1c)
SSID: len 7
64 65 73 6b 53 41 45 deskSAE
< PAE: len 121 9.040843
Interface Index: 3
EAPoL: len 121
Protocol Version: 2 (802.1X-2004)
Type: 3 (Key)
Length: 117
Descriptor Type: 2
Key MIC: true
Secure: false
Error: false
Request: false
Encrypted Key Data: false
SMK Message: false
Key Descriptor Version: 0 (00)
Key Type: true
Install: false
Key ACK: false
Key Length: 0
Key Replay Counter: 1
Key NONCE
86 bb 22 3c 63 05 0e 41 21 ec 49 21 5d f9 94 06 .."<c..A!.I!]...
2a a7 1e 55 f7 14 fc ea 07 e4 2c 4e 39 81 03 2a *..U......,N9..*
Key IV
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
Key RSC
00 00 00 00 00 00 00 00 ........
Key MIC Data
22 8e 84 f2 f9 91 4d 27 7b e6 96 a9 91 df 0f 8a ".....M'{.......
Key Data: len 22
RSN:
Group Data Cipher Suite: len 4
CCMP (00:0f:ac) suite 04
Pairwise Cipher Suite: len 4
CCMP (00:0f:ac) suite 04
AKM Suite: len 4
SAE/PMKSA caching SHA256; RSNA PMKSA caching SHA256/mesh peering exchange (00:0f:ac) suite 08
RSN capabilities: bits 2 - 3: 1 replay counter per PTKSA
RSN capabilities: bits 4 - 5: 1 replay counter per GTKSA
RSN capabilities: bit 7: Management Frame Protection Capable
01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
ac 08 80 00 ....
02 03 00 75 02 01 08 00 00 00 00 00 00 00 00 00 ...u............
01 86 bb 22 3c 63 05 0e 41 21 ec 49 21 5d f9 94 ..."<c..A!.I!]..
06 2a a7 1e 55 f7 14 fc ea 07 e4 2c 4e 39 81 03 .*..U......,N9..
2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 *...............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 22 8e 84 f2 f9 91 4d 27 7b e6 96 a9 91 df 0f .".....M'{......
8a 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac ...0............
04 01 00 00 0f ac 08 80 00 .........
> Response: Get Interface (0x05) len 4 [0x100] 9.040560
Status: Success (0)
> PAE: len 187 9.045312
Interface Index: 3
EAPoL: len 187
Protocol Version: 2 (802.1X-2004)
Type: 3 (Key)
Length: 183
Descriptor Type: 2
Key MIC: true
Secure: true
Error: false
Request: false
Encrypted Key Data: true
SMK Message: false
Key Descriptor Version: 0 (00)
Key Type: true
Install: true
Key ACK: true
Key Length: 16
Key Replay Counter: 2
Key NONCE
69 e3 46 27 40 86 15 c1 c4 ac f2 10 e7 6e 7f 40 i.F'@........n.@
91 72 93 f6 a3 25 c7 4c a5 63 2d 9f 06 26 92 30 .r...%.L.c-..&.0
Key IV
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
Key RSC
00 00 00 00 00 00 00 00 ........
Key MIC Data
bf 8a 76 5a 0f 46 3a 68 9f 64 11 ae 2a 1d 8f fc ..vZ.F:h.d..*...
Key Data: len 88
e4 d6 c3 61 7b a1 65 5d 99 f9 db f2 d1 69 fa e2 ...a{.e].....i..
26 f3 b2 6f 35 0a ef 16 5b 80 35 0a e6 39 24 06 &..o5...[.5..9$.
56 f7 98 84 7b c5 d8 3d d2 22 96 58 38 10 ff b2 V...{..=.".X8...
87 54 2b 62 da 64 3b 2a 61 a0 71 22 c4 97 01 b2 .T+b.d;*a.q"....
c4 54 92 60 a3 bd 12 0b 96 d8 7a 20 f0 78 69 90 .T.`......z .xi.
a3 b4 19 d5 21 f5 3a 56 ....!.:V
02 03 00 b7 02 13 c8 00 10 00 00 00 00 00 00 00 ................
02 69 e3 46 27 40 86 15 c1 c4 ac f2 10 e7 6e 7f .i.F'@........n.
40 91 72 93 f6 a3 25 c7 4c a5 63 2d 9f 06 26 92 @.r...%.L.c-..&.
30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0...............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 bf 8a 76 5a 0f 46 3a 68 9f 64 11 ae 2a 1d 8f ...vZ.F:h.d..*..
fc 00 58 e4 d6 c3 61 7b a1 65 5d 99 f9 db f2 d1 ..X...a{.e].....
69 fa e2 26 f3 b2 6f 35 0a ef 16 5b 80 35 0a e6 i..&..o5...[.5..
39 24 06 56 f7 98 84 7b c5 d8 3d d2 22 96 58 38 9$.V...{..=.".X8
10 ff b2 87 54 2b 62 da 64 3b 2a 61 a0 71 22 c4 ....T+b.d;*a.q".
97 01 b2 c4 54 92 60 a3 bd 12 0b 96 d8 7a 20 f0 ....T.`......z .
78 69 90 a3 b4 19 d5 21 f5 3a 56 xi.....!.:V
< PAE: len 99 9.046063
Interface Index: 3
EAPoL: len 99
Protocol Version: 2 (802.1X-2004)
Type: 3 (Key)
Length: 95
Descriptor Type: 2
Key MIC: true
Secure: true
Error: false
Request: false
Encrypted Key Data: false
SMK Message: false
Key Descriptor Version: 0 (00)
Key Type: true
Install: false
Key ACK: false
Key Length: 0
Key Replay Counter: 2
Key NONCE
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
Key IV
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
Key RSC
00 00 00 00 00 00 00 00 ........
Key MIC Data
f1 89 02 85 dd 01 15 bb 1d b3 14 c3 1e ec 69 a5 ..............i.
Key Data: len 0
02 03 00 5f 02 03 08 00 00 00 00 00 00 00 00 00 ..._............
02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 f1 89 02 85 dd 01 15 bb 1d b3 14 c3 1e ec 69 ...............i
a5 00 00 ...
< Request: New Key (0x0b) len 76 [ack] 9.046411
Interface Index: 3 (0x00000003)
Key: len 64
Key Data: len 16
79 5a 9f 8b ff b5 ca 7f bd 0c 83 a0 bd 5d 6a d9 yZ...........]j.
Key Cipher: CCMP (00:0f:ac) suite 04
Key Index: 1 (0x01)
Key Sequence: len 6
00 00 00 00 00 00 ......
Key Type: Group
Default Key Types: len 4
Multicast: true
> Response: New Key (0x0b) len 4 [0x100] 9.049672
Status: Success (0)
< Request: New Key (0x0b) len 76 [ack] 9.050445
Interface Index: 3 (0x00000003)
Key: len 64
Key Data: len 16
78 1b ea 4b c6 8b 6a d2 96 df 6a 87 b0 0b 05 0d x..K..j...j.....
Key Cipher: BIP (00:0f:ac) suite 06
Key Index: 4 (0x04)
Key Sequence: len 6
00 00 00 00 00 00 ......
Key Type: Group
Default Key Types: len 4
Multicast: true
> Response: New Key (0x0b) len 4 [0x100] 9.053432
Status: Success (0)
< Request: New Key (0x0b) len 56 [ack] 9.053557
Key Data: len 16
46 4b 1e 70 6b 34 e5 f5 f8 3a 8c ab 45 3f 0c a5 FK.pk4...:..E?..
Key Cipher: CCMP (00:0f:ac) suite 04
MAC Address D8:3A:DD:60:A3:0C
Key Index: 0 (0x00)
Interface Index: 3 (0x00000003)
> Response: New Key (0x0b) len 4 [0x100] 9.054111
Status: Success (0)
< Request: Set Station (0x12) len 32 [ack] 9.054156
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
Station Flags 2: len 8
Mask: 0x00000002
Authorized
Set: 0x00000002
Authorized
> Response: Set Station (0x12) len 4 [root] 9.054419
Status: Success (0)
< RTNL: Set Link (0x13) len 32 [request,ack] 9.077705
Flags: 5 (0x005)
Sequence number: 6 (0x00000006)
Port ID: 2259036
IFLA Family: Unknown
IFLA Type: 0
IFLA Index: 3
IFLA ChangeMask: 0
IFLA Flags: (0x00)
LinkMode: userspace controlled (1)
OperState: up (6)
> RTNL: Error (0x02) len 20 [0x100] 9.077727
Flags: 256 (0x100)
Sequence number: 6 (0x00000006)
Port ID: 2259036
ACK: 0
> RTNL: New Address (0x14) len 64 [multi] 9.077812
Flags: 2 (0x002)
Sequence number: 10 (0x0000000a)
Port ID: 2933307082
IFA Family: AF_INET6
IFA Prefixlen: 64
IFA Index: 3
IFA Scope: link
IFA Flags: (0x80) [permanent]
Interface Address: fe80::dea6:32ff:feb4:50cf
CacheInfo:
ifa_prefered: infinite
ifa_valid: infinite
tstamp: 18687235, cstamp: 18687235
Flags: (0x80) [permanent]
Reserved: len 1
> RTNL: Done (0x03) len 4 [multi] 9.077879
Flags: 2 (0x002)
Sequence number: 10 (0x0000000a)
Port ID: 2933307082
Status: 0
< Request: Get Station (0x11) len 20 [ack] 9.950486
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
> Result: New Station (0x13) len 172 9.955278
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
Generation: 0 (0x00000000)
Station Info: len 140
Connected time: 0 (0x00000000)
Inactivity time: 0 (0x00000000)
Total RX bytes: 498 (0x000001f2)
Total TX bytes: 1144 (0x00000478)
Signal strength: -62
TX bitrate: len 16
Bit Rate: 540 (0x0000021c)
Bit Rate (Legacy): 540 (0x021c)
RX bitrate: len 16
Bit Rate: 180 (0x000000b4)
Bit Rate (Legacy): 180 (0x00b4)
RX packets: 3 (0x00000003)
TX packets: 6 (0x00000006)
TX failed: 0 (0x00000000)
BSS parameters: len 20
Short Slot Time: true
DTIM Period: 2 (0x02)
Beacon Interval: 100 (0x0064)
Station flags: len 8
Mask: 0x000000ea
Authorized
WME
Authenticated
TDLS-Peer
Associated
Set: 0x000000a2
Authorized
Authenticated
Associated
> Response: Get Station (0x11) len 4 [0x100] 9.955288
Status: Success (0)
< RTNL: New Address (0x14) len 52 [request,replace,create] 12.084427
Flags: 1281 (0x501)
Sequence number: 11 (0x0000000b)
Port ID: 2933307082
IFA Family: AF_INET
IFA Prefixlen: 24
IFA Index: 3
IFA Scope: global
IFA Flags: (0x80) [permanent]
Local Address: 192.168.5.225
Broadcast Address: 192.168.5.255
Flags: (0x200) [noprefixroute]
CacheInfo:
ifa_prefered: 86399
ifa_valid: 86399
tstamp: 0, cstamp: 0
> RTNL: New Address (0x14) len 72 12.084458
Flags: 0 (0x000)
Sequence number: 11 (0x0000000b)
Port ID: 2933307082
IFA Family: AF_INET
IFA Prefixlen: 24
IFA Index: 3
IFA Scope: global
IFA Flags: (0x00)
Interface Address: 192.168.5.225
Local Address: 192.168.5.225
Broadcast Address: 192.168.5.255
Label (len:6): wlan0
Flags: (0x200) [noprefixroute]
CacheInfo:
ifa_prefered: 86399
ifa_valid: 86399
tstamp: 18731704, cstamp: 18731704
> RTNL: New Address (0x14) len 72 12.084463
Flags: 0 (0x000)
Sequence number: 11 (0x0000000b)
Port ID: 2933307082
IFA Family: AF_INET
IFA Prefixlen: 24
IFA Index: 3
IFA Scope: global
IFA Flags: (0x00)
Interface Address: 192.168.5.225
Local Address: 192.168.5.225
Broadcast Address: 192.168.5.255
Label (len:6): wlan0
Flags: (0x200) [noprefixroute]
CacheInfo:
ifa_prefered: 86399
ifa_valid: 86399
tstamp: 18731704, cstamp: 18731704
> RTNL: New Address (0x14) len 72 12.084470
Flags: 0 (0x000)
Sequence number: 11 (0x0000000b)
Port ID: 2933307082
IFA Family: AF_INET
IFA Prefixlen: 24
IFA Index: 3
IFA Scope: global
IFA Flags: (0x00)
Interface Address: 192.168.5.225
Local Address: 192.168.5.225
Broadcast Address: 192.168.5.255
Label (len:6): wlan0
Flags: (0x200) [noprefixroute]
CacheInfo:
ifa_prefered: 86399
ifa_valid: 86399
tstamp: 18731704, cstamp: 18731704
> RTNL: New Address (0x14) len 72 12.084476
Flags: 0 (0x000)
Sequence number: 11 (0x0000000b)
Port ID: 2933307082
IFA Family: AF_INET
IFA Prefixlen: 24
IFA Index: 3
IFA Scope: global
IFA Flags: (0x00)
Interface Address: 192.168.5.225
Local Address: 192.168.5.225
Broadcast Address: 192.168.5.255
Label (len:6): wlan0
Flags: (0x200) [noprefixroute]
CacheInfo:
ifa_prefered: 86399
ifa_valid: 86399
tstamp: 18731704, cstamp: 18731704
> RTNL: New Address (0x14) len 72 12.084480
Flags: 0 (0x000)
Sequence number: 11 (0x0000000b)
Port ID: 2933307082
IFA Family: AF_INET
IFA Prefixlen: 24
IFA Index: 3
IFA Scope: global
IFA Flags: (0x00)
Interface Address: 192.168.5.225
Local Address: 192.168.5.225
Broadcast Address: 192.168.5.255
Label (len:6): wlan0
Flags: (0x200) [noprefixroute]
CacheInfo:
ifa_prefered: 86399
ifa_valid: 86399
tstamp: 18731704, cstamp: 18731704
< RTNL: New Route (0x18) len 44 [request,replace,create] 12.086445
Flags: 1281 (0x501)
Sequence number: 12 (0x0000000c)
Port ID: 2933307082
RTM Family: AF_INET
RTM Destination Len: 24
RTM Source Len: 0
RTM TOS Field: 0
RTM Table: 254
RTM Protocol: dhcp
RTM Scope: link
RTM Type: 1
RTM Flags: (0x00)
Output Interface Index: 3
Priority of the route: 303
Destination Address: 192.168.5.0
Route lifetime: 86399 (0x0001517f)
> RTNL: New Route (0x18) len 44 [excl,create] 12.086771
Flags: 1536 (0x600)
Sequence number: 12 (0x0000000c)
Port ID: 2933307082
RTM Family: AF_INET
RTM Destination Len: 24
RTM Source Len: 0
RTM TOS Field: 0
RTM Table: 254
RTM Protocol: dhcp
RTM Scope: link
RTM Type: 1
RTM Flags: (0x00)
Routing Table: 254 (0x000000fe)
Destination Address: 192.168.5.0
Priority of the route: 303
Output Interface Index: 3
< RTNL: New Route (0x18) len 52 [request,replace,create] 12.086829
Flags: 1281 (0x501)
Sequence number: 13 (0x0000000d)
Port ID: 2933307082
RTM Family: AF_INET
RTM Destination Len: 0
RTM Source Len: 0
RTM TOS Field: 0
RTM Table: 254
RTM Protocol: dhcp
RTM Scope: global
RTM Type: 1
RTM Flags: (0x00)
Output Interface Index: 3
Priority of the route: 303
Gateway: 192.168.5.1
Preferred Source: 192.168.5.225
Route lifetime: 86399 (0x0001517f)
> RTNL: New Route (0x18) len 52 [excl,create] 12.086849
Flags: 1536 (0x600)
Sequence number: 13 (0x0000000d)
Port ID: 2933307082
RTM Family: AF_INET
RTM Destination Len: 0
RTM Source Len: 0
RTM TOS Field: 0
RTM Table: 254
RTM Protocol: dhcp
RTM Scope: global
RTM Type: 1
RTM Flags: (0x00)
Routing Table: 254 (0x000000fe)
Priority of the route: 303
Preferred Source: 192.168.5.225
Gateway: 192.168.5.1
Output Interface Index: 3
> RTNL: Error (0x02) len 20 [0x100] 12.086894
Flags: 256 (0x100)
Sequence number: 14 (0x0000000e)
Port ID: 2933307082
ACK: 0
> RTNL: Error (0x02) len 20 [0x100] 12.086916
Flags: 256 (0x100)
Sequence number: 15 (0x0000000f)
Port ID: 2933307082
ACK: 0
[-- Attachment #3: iwd_dhcp_journal.txt --]
[-- Type: text/plain, Size: 7387 bytes --]
Jan 22 19:57:56 Pi4 connmand[53107]: Interface wlan0 [ wifi ] state is association
Jan 22 19:57:56 Pi4 iwd[2259036]: src/network.c:network_connect()
Jan 22 19:57:56 Pi4 iwd[2259036]: src/wiphy.c:wiphy_select_akm() Network is WPA3-Personal...
Jan 22 19:57:56 Pi4 iwd[2259036]: event: connect-info, FullMAC driver: brcmfmac using SAE. Expect EXTERNAL_AUTH
Jan 22 19:57:56 Pi4 iwd[2259036]: src/network.c:network_connect_psk() ask_passphrase: true
Jan 22 19:57:56 Pi4 iwd[2259036]: src/agent.c:agent_request_passphrase() agent 0x5596df5f90 owner :1.1969 path /net/connman/iwd_agent
Jan 22 19:57:56 Pi4 iwd[2259036]: src/agent.c:agent_send_next_request() send request to :1.1969 /net/connman/iwd_agent
Jan 22 19:57:56 Pi4 iwd[2259036]: src/agent.c:agent_receive_reply() agent 0x5596df5f90 request id 297
Jan 22 19:57:56 Pi4 iwd[2259036]: src/network.c:passphrase_callback() result 0
Jan 22 19:57:56 Pi4 iwd[2259036]: src/wiphy.c:wiphy_select_akm() Network is WPA3-Personal...
Jan 22 19:57:56 Pi4 iwd[2259036]: event: connect-info, FullMAC driver: brcmfmac using SAE. Expect EXTERNAL_AUTH
Jan 22 19:57:56 Pi4 iwd[2259036]: src/network.c:network_generate_sae_pt() Generating PT for Group 19
Jan 22 19:57:56 Pi4 iwd[2259036]: src/network.c:network_generate_sae_pt() Generating PT for Group 20
Jan 22 19:57:56 Pi4 iwd[2259036]: src/wiphy.c:wiphy_select_akm() Network is WPA3-Personal...
Jan 22 19:57:56 Pi4 iwd[2259036]: event: connect-info, FullMAC driver: brcmfmac using SAE. Expect EXTERNAL_AUTH
Jan 22 19:57:56 Pi4 iwd[2259036]: src/netdev.c:netdev_cqm_rssi_update()
Jan 22 19:57:56 Pi4 iwd[2259036]: src/wiphy.c:wiphy_radio_work_insert() Inserting work item 17
Jan 22 19:57:56 Pi4 iwd[2259036]: src/wiphy.c:wiphy_radio_work_next() Starting work item 17
Jan 22 19:57:56 Pi4 iwd[2259036]: event: connect-info, ssid: deskSAE, bss: d8:3a:dd:60:a3:0c, signal: -59, load: 0/255
Jan 22 19:57:56 Pi4 iwd[2259036]: event: state, old: disconnected, new: connecting
Jan 22 19:57:56 Pi4 iwd[2259036]: src/netdev.c:netdev_cmd_set_cqm_cb() CMD_SET_CQM not supported, falling back to polling
Jan 22 19:57:56 Pi4 connmand[53107]: Interface wlan0 [ wifi ] state is configuration
Jan 22 19:57:56 Pi4 iwd[2259036]: src/netdev.c:netdev_unicast_notify() Unicast notification External Auth(127)
Jan 22 19:57:56 Pi4 iwd[2259036]: event: connect-info, External Auth to SSID: deskSAE, bssid: d8:3a:dd:60:a3:0c
Jan 22 19:57:56 Pi4 iwd[2259036]: src/netdev.c:netdev_external_auth_sae_tx_authenticate()
Jan 22 19:57:56 Pi4 iwd[2259036]: src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60)
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_external_auth_sae_tx_authenticate()
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_unicast_notify() Unicast notification Frame(59)
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60)
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_external_auth_sae_tx_associate()
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_unicast_notify() Unicast notification Frame(59)
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_mlme_notify() MLME notification Connect(46)
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_connect_event()
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_connect_event() aborting and ignore_connect_event not set, proceed
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_connect_event() expect_connect_failure not set, proceed
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:parse_request_ies()
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_connect_event() Request / Response IEs parsed
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_get_oci()
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_link_notify() event 16 on ifindex 3
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_get_oci_cb() Obtained OCI: freq: 2412, width: 1, center1: 2412, center2: 0
Jan 22 19:57:57 Pi4 iwd[2259036]: src/eapol.c:eapol_start()
Jan 22 19:57:57 Pi4 iwd[2259036]: src/station.c:station_handshake_event() Handshaking
Jan 22 19:57:57 Pi4 iwd[2259036]: src/eapol.c:eapol_handle_ptk_1_of_4() ifindex=3
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_link_notify() event 16 on ifindex 3
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_link_notify() event 16 on ifindex 3
Jan 22 19:57:57 Pi4 iwd[2259036]: src/eapol.c:eapol_handle_ptk_3_of_4() ifindex=3
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_set_gtk() ifindex=3 key_idx=1
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_set_igtk() ifindex=3 key_idx=4
Jan 22 19:57:57 Pi4 iwd[2259036]: src/handshake.c:handshake_state_install_ptk() Adding PMKSA expiration
Jan 22 19:57:57 Pi4 iwd[2259036]: src/station.c:station_handshake_event() Setting keys
Jan 22 19:57:57 Pi4 iwd[2259036]: src/network.c:network_sync_settings()
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_set_tk() ifindex=3 key_idx=0
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_new_group_key_cb() ifindex: 3, err: 0
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:try_handshake_complete() ptk_installed: 0, gtk_installed: 1, igtk_installed: 0
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_new_group_management_key_cb() ifindex: 3, err: 0
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:try_handshake_complete() ptk_installed: 0, gtk_installed: 1, igtk_installed: 1
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_set_station_cb()
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:try_handshake_complete() ptk_installed: 1, gtk_installed: 1, igtk_installed: 1
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:try_handshake_complete() nhs->complete: 0
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:try_handshake_complete() Invoking handshake_event()
Jan 22 19:57:57 Pi4 iwd[2259036]: src/handshake.c:handshake_state_cache_pmksa() Caching PMKSA for d8:3a:dd:60:a3:0c
Jan 22 19:57:57 Pi4 iwd[2259036]: src/pmksa.c:pmksa_cache_put() Adding entry with PMKID: 8603031eecbf347ff3bf5e9948c98e8f
Jan 22 19:57:57 Pi4 iwd[2259036]: src/netdev.c:netdev_connect_ok()
Jan 22 19:57:57 Pi4 iwd[2259036]: src/station.c:station_connect_cb() 3, result: 0
Jan 22 19:57:57 Pi4 iwd[2259036]: src/station.c:station_connect_ok()
Jan 22 19:57:57 Pi4 iwd[2259036]: event: state, old: connecting, new: connecting (netconfig)
Jan 22 19:57:57 Pi4 iwd[2259036]: src/wiphy.c:wiphy_radio_work_done() Work item 17 done
Jan 22 19:58:00 Pi4 iwd[2259036]: src/netconfig.c:netconfig_event_handler() l_netconfig event 0
Jan 22 19:58:00 Pi4 iwd[2259036]: src/netconfig-commit.c:netconfig_commit_print_addrs() installing address: 192.168.5.225
Jan 22 19:58:00 Pi4 iwd[2259036]: src/resolve.c:resolve_systemd_set_dns() ifindex: 3
Jan 22 19:58:00 Pi4 iwd[2259036]: src/resolve.c:systemd_builder_add_dns() installing DNS: 192.168.5.1
Jan 22 19:58:00 Pi4 iwd[2259036]: event: state, old: connecting (netconfig), new: connected
Jan 22 19:58:00 Pi4 iwd[2259036]: src/netconfig-commit.c:netconfig_dhcp_gateway_to_arp() Gateway MAC is known, setting into ARP cache
Jan 22 19:58:00 Pi4 connmand[53107]: wlan0 {add} address 192.168.5.225/24 label wlan0 family 2
Jan 22 19:58:00 Pi4 systemd-resolved[346]: wlan0: Bus client set DNS server list to: 192.168.5.1
Jan 22 19:58:07 Pi4 connmand[53107]: Interface wlan0 [ wifi ] state is ready
Jan 22 19:58:07 Pi4 iwd[2259036]: src/netconfig.c:netconfig_event_handler() l_netconfig event 3
[-- Attachment #4: iwd_apipa_iwmon.txt --]
[-- Type: text/plain, Size: 20266 bytes --]
Wireless monitor ver 3.3
Created interface nlmon
> Response: Set CQM (0x3f) len 4 9.192213
Status: Operation not supported (95)
< Request: Connect (0x2e) len 164 [ack] 9.192280
Interface Index: 3 (0x00000003)
Wiphy Frequency: 2412 (0x0000096c)
MAC Address D8:3A:DD:60:A3:0C
SSID: len 7
64 65 73 6b 53 41 45 deskSAE
Auth Type: 0 (0x00000000)
External Auth Support: 261 len 0
Privacy: true
Socket Owns Interface/Connection: true
Cipher Suites Pairwise:
CCMP (00:0f:ac) suite 04
Cipher Suite Group: CCMP (00:0f:ac) suite 04
Use MFP: 1 (0x00000001)
AKM Suites:
SAE/PMKSA caching SHA256; RSNA PMKSA caching SHA256/mesh peering exchange (00:0f:ac) suite 08
WPA Versions: 4 (0x00000004)
Control Port: true
Information Elements: len 56
RSN:
Group Data Cipher Suite: len 4
CCMP (00:0f:ac) suite 04
Pairwise Cipher Suite: len 4
CCMP (00:0f:ac) suite 04
AKM Suite: len 4
SAE/PMKSA caching SHA256; RSNA PMKSA caching SHA256/mesh peering exchange (00:0f:ac) suite 08
RSN capabilities: bits 2 - 3: 1 replay counter per PTKSA
RSN capabilities: bits 4 - 5: 1 replay counter per GTKSA
RSN capabilities: bit 7: Management Frame Protection Capable
PMKID: dc:12:25:e2:88:92:74:53:b9:87:9a:01:d4:7d:7a:f5
01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
ac 08 80 00 01 00 dc 12 25 e2 88 92 74 53 b9 87 ........%...tS..
9a 01 d4 7d 7a f5 ...}z.
Extended Capabilities: len 10
Capability: bit 19: BSS transition
00 00 08 00 00 00 00 00 00 01 ..........
Tag 262: len 1
1a .
> Response: Connect (0x2e) len 4 [0x100] 9.216865
Status: Success (0)
> Event: External Auth (0x7f) len 56 9.309833
Wiphy: 0 (0x00000000)
Interface Index: 3 (0x00000003)
AKM Suites:
unknown (08:ac:0f) suite 00 (unknown)
External Auth Action: 260 len 4
00 00 00 00 ....
BSSID D8:3A:DD:60:A3:0C
SSID: len 7
64 65 73 6b 53 41 45 deskSAE
< Request: External Auth (0x7f) len 40 [ack] 9.309988
Interface Index: 3 (0x00000003)
Status Code: 1 (0x0001)
SSID: len 7
64 65 73 6b 53 41 45 deskSAE
BSSID D8:3A:DD:60:A3:0C
> Response: External Auth (0x7f) len 4 [0x100] 9.310399
Status: Success (0)
< Request: Get Station (0x11) len 20 [ack] 10.192319
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
> Result: New Station (0x13) len 92 10.196490
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
Generation: 0 (0x00000000)
Station Info: len 60
Inactivity time: 0 (0x00000000)
Total RX bytes: 0 (0x00000000)
Total TX bytes: 0 (0x00000000)
RX packets: 0 (0x00000000)
TX packets: 0 (0x00000000)
TX failed: 0 (0x00000000)
Station flags: len 8
Mask: 0x000000ea
Authorized
WME
Authenticated
TDLS-Peer
Associated
Set: 0x00000000
> Response: Get Station (0x11) len 4 [0x100] 10.196500
Status: Success (0)
< Request: Get Station (0x11) len 20 [ack] 16.196580
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
> Result: New Station (0x13) len 92 16.200751
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
Generation: 0 (0x00000000)
Station Info: len 60
Inactivity time: 6000 (0x00001770)
Total RX bytes: 0 (0x00000000)
Total TX bytes: 0 (0x00000000)
RX packets: 0 (0x00000000)
TX packets: 0 (0x00000000)
TX failed: 0 (0x00000000)
Station flags: len 8
Mask: 0x000000ea
Authorized
WME
Authenticated
TDLS-Peer
Associated
Set: 0x00000000
> Response: Get Station (0x11) len 4 [0x100] 16.200761
Status: Success (0)
< Request: Get Station (0x11) len 20 [ack] 22.200838
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
> Result: New Station (0x13) len 92 22.204958
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
Generation: 0 (0x00000000)
Station Info: len 60
Inactivity time: 12000 (0x00002ee0)
Total RX bytes: 0 (0x00000000)
Total TX bytes: 0 (0x00000000)
RX packets: 0 (0x00000000)
TX packets: 0 (0x00000000)
TX failed: 0 (0x00000000)
Station flags: len 8
Mask: 0x000000ea
Authorized
WME
Authenticated
TDLS-Peer
Associated
Set: 0x00000000
> Response: Get Station (0x11) len 4 [0x100] 22.204968
Status: Success (0)
< Request: Get Station (0x11) len 20 [ack] 28.205049
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
> Result: New Station (0x13) len 92 28.209165
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
Generation: 0 (0x00000000)
Station Info: len 60
Inactivity time: 18000 (0x00004650)
Total RX bytes: 0 (0x00000000)
Total TX bytes: 0 (0x00000000)
RX packets: 0 (0x00000000)
TX packets: 0 (0x00000000)
TX failed: 0 (0x00000000)
Station flags: len 8
Mask: 0x000000ea
Authorized
WME
Authenticated
TDLS-Peer
Associated
Set: 0x00000000
> Response: Get Station (0x11) len 4 [0x100] 28.209174
Status: Success (0)
< Request: Get Station (0x11) len 20 [ack] 34.209261
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
> Result: New Station (0x13) len 92 34.213367
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
Generation: 0 (0x00000000)
Station Info: len 60
Inactivity time: 24000 (0x00005dc0)
Total RX bytes: 0 (0x00000000)
Total TX bytes: 0 (0x00000000)
RX packets: 0 (0x00000000)
TX packets: 0 (0x00000000)
TX failed: 0 (0x00000000)
Station flags: len 8
Mask: 0x000000ea
Authorized
WME
Authenticated
TDLS-Peer
Associated
Set: 0x00000000
> Response: Get Station (0x11) len 4 [0x100] 34.213378
Status: Success (0)
< Request: Get Station (0x11) len 20 [ack] 40.213458
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
> Result: New Station (0x13) len 92 40.217595
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
Generation: 0 (0x00000000)
Station Info: len 60
Inactivity time: 30000 (0x00007530)
Total RX bytes: 0 (0x00000000)
Total TX bytes: 0 (0x00000000)
RX packets: 0 (0x00000000)
TX packets: 0 (0x00000000)
TX failed: 0 (0x00000000)
Station flags: len 8
Mask: 0x000000ea
Authorized
WME
Authenticated
TDLS-Peer
Associated
Set: 0x00000000
> Response: Get Station (0x11) len 4 [0x100] 40.217604
Status: Success (0)
< Request: Get Station (0x11) len 20 [ack] 46.217682
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
> Result: New Station (0x13) len 92 46.221795
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
Generation: 0 (0x00000000)
Station Info: len 60
Inactivity time: 36000 (0x00008ca0)
Total RX bytes: 0 (0x00000000)
Total TX bytes: 0 (0x00000000)
RX packets: 0 (0x00000000)
TX packets: 0 (0x00000000)
TX failed: 0 (0x00000000)
Station flags: len 8
Mask: 0x000000ea
Authorized
WME
Authenticated
TDLS-Peer
Associated
Set: 0x00000000
> Response: Get Station (0x11) len 4 [0x100] 46.221805
Status: Success (0)
< Request: Get Station (0x11) len 20 [ack] 52.221886
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
> Result: New Station (0x13) len 92 52.225105
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
Generation: 0 (0x00000000)
Station Info: len 60
Inactivity time: 42000 (0x0000a410)
Total RX bytes: 0 (0x00000000)
Total TX bytes: 0 (0x00000000)
RX packets: 0 (0x00000000)
TX packets: 0 (0x00000000)
TX failed: 0 (0x00000000)
Station flags: len 8
Mask: 0x000000ea
Authorized
WME
Authenticated
TDLS-Peer
Associated
Set: 0x00000000
> Response: Get Station (0x11) len 4 [0x100] 52.225115
Status: Success (0)
< RTNL: New Address (0x14) len 24 [request,ack,replace] 55.039375
Flags: 261 (0x105)
Sequence number: 1 (0x00000001)
Port ID: 0
IFA Family: AF_INET
IFA Prefixlen: 16
IFA Index: 3
IFA Scope: global
IFA Flags: (0x80) [permanent]
Local Address: 169.254.67.142
Broadcast Address: 169.254.255.255
> RTNL: New Address (0x14) len 72 55.039414
Flags: 0 (0x000)
Sequence number: 1 (0x00000001)
Port ID: 2755997909
IFA Family: AF_INET
IFA Prefixlen: 16
IFA Index: 3
IFA Scope: global
IFA Flags: (0x80) [permanent]
Interface Address: 169.254.67.142
Local Address: 169.254.67.142
Broadcast Address: 169.254.255.255
Label (len:6): wlan0
Flags: (0x80) [permanent]
CacheInfo:
ifa_prefered: infinite
ifa_valid: infinite
tstamp: 18655900, cstamp: 18655900
> RTNL: New Address (0x14) len 72 55.039422
Flags: 0 (0x000)
Sequence number: 1 (0x00000001)
Port ID: 2755997909
IFA Family: AF_INET
IFA Prefixlen: 16
IFA Index: 3
IFA Scope: global
IFA Flags: (0x80) [permanent]
Interface Address: 169.254.67.142
Local Address: 169.254.67.142
Broadcast Address: 169.254.255.255
Label (len:6): wlan0
Flags: (0x80) [permanent]
CacheInfo:
ifa_prefered: infinite
ifa_valid: infinite
tstamp: 18655900, cstamp: 18655900
> RTNL: New Address (0x14) len 72 55.039428
Flags: 0 (0x000)
Sequence number: 1 (0x00000001)
Port ID: 2755997909
IFA Family: AF_INET
IFA Prefixlen: 16
IFA Index: 3
IFA Scope: global
IFA Flags: (0x80) [permanent]
Interface Address: 169.254.67.142
Local Address: 169.254.67.142
Broadcast Address: 169.254.255.255
Label (len:6): wlan0
Flags: (0x80) [permanent]
CacheInfo:
ifa_prefered: infinite
ifa_valid: infinite
tstamp: 18655900, cstamp: 18655900
> RTNL: New Address (0x14) len 72 55.039432
Flags: 0 (0x000)
Sequence number: 1 (0x00000001)
Port ID: 2755997909
IFA Family: AF_INET
IFA Prefixlen: 16
IFA Index: 3
IFA Scope: global
IFA Flags: (0x80) [permanent]
Interface Address: 169.254.67.142
Local Address: 169.254.67.142
Broadcast Address: 169.254.255.255
Label (len:6): wlan0
Flags: (0x80) [permanent]
CacheInfo:
ifa_prefered: infinite
ifa_valid: infinite
tstamp: 18655900, cstamp: 18655900
> RTNL: New Address (0x14) len 72 55.039436
Flags: 0 (0x000)
Sequence number: 1 (0x00000001)
Port ID: 2755997909
IFA Family: AF_INET
IFA Prefixlen: 16
IFA Index: 3
IFA Scope: global
IFA Flags: (0x80) [permanent]
Interface Address: 169.254.67.142
Local Address: 169.254.67.142
Broadcast Address: 169.254.255.255
Label (len:6): wlan0
Flags: (0x80) [permanent]
CacheInfo:
ifa_prefered: infinite
ifa_valid: infinite
tstamp: 18655900, cstamp: 18655900
> RTNL: New Route (0x18) len 44 [excl,create] 55.039499
Flags: 1536 (0x600)
Sequence number: 0 (0x00000000)
Port ID: 0
RTM Family: AF_INET
RTM Destination Len: 16
RTM Source Len: 0
RTM TOS Field: 0
RTM Table: 254
RTM Protocol: kernel
RTM Scope: link
RTM Type: 1
RTM Flags: (0x00)
Routing Table: 254 (0x000000fe)
Destination Address: 169.254.0.0
Preferred Source: 169.254.67.142
Output Interface Index: 3
> RTNL: Error (0x02) len 20 [0x100] 55.044039
Flags: 256 (0x100)
Sequence number: 1 (0x00000001)
Port ID: 2755997909
ACK: 0
< RTNL: Get Link (0x12) len 4 [request,dump] 55.044188
Flags: 769 (0x301)
Sequence number: 1737596722 (0x67919f32)
Port ID: 0
> RTNL: New Link (0x10) len 1412 [multi] 55.044233
Flags: 2 (0x002)
Sequence number: 1737596722 (0x67919f32)
Port ID: 2965617672
> RTNL: New Link (0x10) len 1464 [multi] 55.044233
Flags: 2 (0x002)
Sequence number: 1737596722 (0x67919f32)
Port ID: 2965617672
> RTNL: New Link (0x10) len 1460 [multi] 55.044259
Flags: 2 (0x002)
Sequence number: 1737596722 (0x67919f32)
Port ID: 2965617672
IFLA Family: Unknown
IFLA Type: 1
IFLA Index: 3
IFLA ChangeMask: 0
IFLA Flags: (0x1043) [up,broadcast,running,multicast]
IfName (len:6): wlan0
Txqlen: 4000 (0x00000fa0)
OperState: up (6)
LinkMode: userspace controlled (1)
MTU: 1500 (0x000005dc)
Reserved: len 4
Reserved: len 4
Reserved: len 4
Reserved: len 4
Reserved: len 4
Reserved: len 4
Reserved: len 4
Reserved: len 4
Reserved: len 4
Reserved: len 4
Reserved: len 4
Reserved: len 4
Reserved: len 4
Reserved: len 4
Reserved: len 1
Qdisc (len:11): pfifo_fast
Reserved: len 4
Reserved: len 4
Reserved: len 4
Reserved: len 1
Map: len 32
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
Interface Address: dc:a6:32:b4:50:cf
Broadcast Address: ff:ff:ff:ff:ff:ff
Reserved: len 200
Stats: len 96
f5 01 00 00 18 17 00 00 2b f8 00 00 46 35 29 00 ........+...F5).
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
Reserved: len 8
Reserved: len 6
Reserved: len 808
Reserved: len 12
Reserved: len 5
Reserved: len 0
> RTNL: New Link (0x10) len 1408 [multi] 55.044259
Flags: 2 (0x002)
Sequence number: 1737596722 (0x67919f32)
Port ID: 2965617672
> RTNL: Done (0x03) len 4 [multi] 55.044273
Flags: 2 (0x002)
Sequence number: 1737596722 (0x67919f32)
Port ID: 2965617672
Status: 0
> RTNL: New Address (0x14) len 72 [multi] 55.044296
Flags: 2 (0x002)
Sequence number: 1737596723 (0x67919f33)
Port ID: 2965617672
IFA Family: AF_INET
IFA Prefixlen: 16
IFA Index: 3
IFA Scope: global
IFA Flags: (0x80) [permanent]
Interface Address: 169.254.67.142
Local Address: 169.254.67.142
Broadcast Address: 169.254.255.255
Label (len:6): wlan0
Flags: (0x80) [permanent]
CacheInfo:
ifa_prefered: infinite
ifa_valid: infinite
tstamp: 18655900, cstamp: 18655900
> RTNL: New Address (0x14) len 64 [multi] 55.044318
Flags: 2 (0x002)
Sequence number: 1737596723 (0x67919f33)
Port ID: 2965617672
IFA Family: AF_INET6
IFA Prefixlen: 64
IFA Index: 3
IFA Scope: link
IFA Flags: (0x80) [permanent]
Interface Address: fe80::dea6:32ff:feb4:50cf
CacheInfo:
ifa_prefered: infinite
ifa_valid: infinite
tstamp: 18645188, cstamp: 18645188
Flags: (0x80) [permanent]
Reserved: len 1
> RTNL: Done (0x03) len 4 [multi] 55.044327
Flags: 2 (0x002)
Sequence number: 1737596723 (0x67919f33)
Port ID: 2965617672
Status: 0
< RTNL: New Route (0x18) len 36 [request,ack,excl,create] 55.044447
Flags: 1541 (0x605)
Sequence number: 1737596723 (0x67919f33)
Port ID: 0
RTM Family: AF_INET
RTM Destination Len: 0
RTM Source Len: 0
RTM TOS Field: 0
RTM Table: 254
RTM Protocol: boot
RTM Scope: global
RTM Type: 1
RTM Flags: (0x00)
Gateway: 0.0.0.0
Output Interface Index: 3
Priority of the route: -3073
> RTNL: New Route (0x18) len 36 [excl,create] 55.044480
Flags: 1536 (0x600)
Sequence number: 1737596723 (0x67919f33)
Port ID: 2932237557
RTM Family: AF_INET
RTM Destination Len: 0
RTM Source Len: 0
RTM TOS Field: 0
RTM Table: 254
RTM Protocol: boot
RTM Scope: global
RTM Type: 1
RTM Flags: (0x00)
Routing Table: 254 (0x000000fe)
Priority of the route: -3073
Output Interface Index: 3
> RTNL: Error (0x02) len 20 [0x100] 55.044486
Flags: 256 (0x100)
Sequence number: 1737596723 (0x67919f33)
Port ID: 2932237557
ACK: 0
< Request: Get Station (0x11) len 20 [ack] 58.225196
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
> Result: New Station (0x13) len 92 58.229317
Interface Index: 3 (0x00000003)
MAC Address D8:3A:DD:60:A3:0C
Generation: 0 (0x00000000)
Station Info: len 60
Inactivity time: 48000 (0x0000bb80)
Total RX bytes: 0 (0x00000000)
Total TX bytes: 0 (0x00000000)
RX packets: 0 (0x00000000)
TX packets: 0 (0x00000000)
TX failed: 0 (0x00000000)
Station flags: len 8
Mask: 0x000000ea
Authorized
WME
Authenticated
TDLS-Peer
Associated
Set: 0x00000000
> Response: Get Station (0x11) len 4 [0x100] 58.229327
Status: Success (0)
[-- Attachment #5: iwd_apipa_journal.txt --]
[-- Type: text/plain, Size: 2903 bytes --]
Jan 22 19:44:36 Pi4 connmand[53107]: Interface wlan0 [ wifi ] state is association
Jan 22 19:44:36 Pi4 iwd[2259036]: src/network.c:network_connect()
Jan 22 19:44:36 Pi4 iwd[2259036]: src/wiphy.c:wiphy_select_akm() Network is WPA3-Personal...
Jan 22 19:44:36 Pi4 iwd[2259036]: event: connect-info, FullMAC driver: brcmfmac using SAE. Expect EXTERNAL_AUTH
Jan 22 19:44:36 Pi4 iwd[2259036]: src/network.c:network_connect_psk() ask_passphrase: true
Jan 22 19:44:36 Pi4 iwd[2259036]: src/agent.c:agent_request_passphrase() agent 0x5596df5f90 owner :1.1969 path /net/connman/iwd_agent
Jan 22 19:44:36 Pi4 iwd[2259036]: src/agent.c:agent_send_next_request() send request to :1.1969 /net/connman/iwd_agent
Jan 22 19:44:36 Pi4 iwd[2259036]: src/agent.c:agent_receive_reply() agent 0x5596df5f90 request id 279
Jan 22 19:44:36 Pi4 iwd[2259036]: src/network.c:passphrase_callback() result 0
Jan 22 19:44:36 Pi4 iwd[2259036]: src/wiphy.c:wiphy_select_akm() Network is WPA3-Personal...
Jan 22 19:44:36 Pi4 iwd[2259036]: event: connect-info, FullMAC driver: brcmfmac using SAE. Expect EXTERNAL_AUTH
Jan 22 19:44:36 Pi4 iwd[2259036]: src/network.c:network_generate_sae_pt() Generating PT for Group 19
Jan 22 19:44:36 Pi4 iwd[2259036]: src/network.c:network_generate_sae_pt() Generating PT for Group 20
Jan 22 19:44:36 Pi4 iwd[2259036]: src/wiphy.c:wiphy_select_akm() Network is WPA3-Personal...
Jan 22 19:44:36 Pi4 iwd[2259036]: event: connect-info, FullMAC driver: brcmfmac using SAE. Expect EXTERNAL_AUTH
Jan 22 19:44:36 Pi4 iwd[2259036]: src/pmksa.c:pmksa_cache_get() Returning entry with PMKID: dc1225e288927453b9879a01d47d7af5
Jan 22 19:44:36 Pi4 iwd[2259036]: src/netdev.c:netdev_connect_common() Skipping SAE by using PMKSA cache
Jan 22 19:44:36 Pi4 iwd[2259036]: src/netdev.c:netdev_cqm_rssi_update()
Jan 22 19:44:36 Pi4 iwd[2259036]: src/wiphy.c:wiphy_radio_work_insert() Inserting work item 15
Jan 22 19:44:36 Pi4 iwd[2259036]: src/wiphy.c:wiphy_radio_work_next() Starting work item 15
Jan 22 19:44:36 Pi4 iwd[2259036]: event: connect-info, ssid: deskSAE, bss: d8:3a:dd:60:a3:0c, signal: -59, load: 0/255
Jan 22 19:44:36 Pi4 iwd[2259036]: event: state, old: disconnected, new: connecting
Jan 22 19:44:36 Pi4 iwd[2259036]: src/netdev.c:netdev_cmd_set_cqm_cb() CMD_SET_CQM not supported, falling back to polling
Jan 22 19:44:36 Pi4 connmand[53107]: Interface wlan0 [ wifi ] state is configuration
Jan 22 19:44:36 Pi4 iwd[2259036]: src/netdev.c:netdev_unicast_notify() Unicast notification External Auth(127)
Jan 22 19:44:36 Pi4 iwd[2259036]: event: connect-info, External Auth to SSID: deskSAE, bssid: d8:3a:dd:60:a3:0c
Jan 22 19:44:36 Pi4 kernel: ieee80211 phy0: brcmf_cfg80211_external_auth: External authentication failed: status=1
Jan 22 19:45:22 Pi4 connmand[53107]: Interface wlan0 [ wifi ] state is ready
Jan 22 19:45:22 Pi4 connmand[53107]: wlan0 {add} address 169.254.67.142/16 label wlan0 family 2
^ permalink raw reply [flat|nested] 7+ messages in thread