You are not logged in.

#1 2020-04-05 20:59:02

ratchet
Member
From: New York, NY
Registered: 2009-11-14
Posts: 12

Connecting with Panda N600/pau09 (RT5572) fails at wpa_supplicant

I bought this wifi-dongle for my desktop. For a minute, it worked great. I plugged it in, used wifi-menu to connect to my network and started updating. After I had updated my system, the adapter stopped working. I thought it might have been because I updated linux-firmware package, but downgrading did not help.

At any rate, I am now focused on getting the dongle to work on a laptop that dual-boots windows 10, because the dongle works in the windows installation, so I think I can rule out a hardware issue with either the adapter or the machine (?).

On the laptop, I can do the following without issue. After stopping the netctl daemon that normally starts the onboard wifi chip, I rmmod iwlwifi just in case it is somehow interfering and then:

# lsusb
...
Bus 002 Device 027: ID 148f:5572 Ralink Technology, Corp. RT5572 Wireless Adapter
...
# lsmod
...
rt2800usb              32768  0
rt2x00usb              28672  1 rt2800usb
rt2800lib             143360  1 rt2800usb
rt2x00lib              86016  3 rt2800usb,rt2x00usb,rt2800lib
...

Then

# ip link set wlp0s20u2 up
# iw dev wlp0s20u2 scan

No issue.

I run into trouble with

# wpa_supplicant -d -i wlp0s20u2 -c <(wpa_passphrase DINGO mypassphrase)

I know that starting wpa_supplicant this way can cause problems with long passwords or passwords with special characters, but I have tried passing a path to a config file as well. Also the passphrase is not complicated.

The output from wpa_supplicant is a lot, and I don't know how to read it. I'll paste in up til the point where it seems to give up on the network I'm trying to sign in to:

wpa_supplicant v2.9
Successfully initialized wpa_supplicant
Initializing interface 'wlp0s20u2' conf '/dev/fd/63' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/dev/fd/63' -> '/dev/fd/63'
Reading configuration file '/dev/fd/63'
Priority group 0
   id=0 ssid='DINGO'
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:10
nl80211: Supported cipher 00-0f-ac:8
nl80211: Supported cipher 00-0f-ac:9
nl80211: Using driver-based off-channel TX
nl80211: Driver-advertised extended capabilities (default) - hexdump(len=8): 00 00 00 00 00 00 00 40
nl80211: Driver-advertised extended capabilities mask (default) - hexdump(len=8): 00 00 00 00 00 00 00 40
nl80211: interface wlp0s20u2 in phy phy3
nl80211: Set mode ifindex 4 iftype 2 (STATION)
nl80211: Subscribe to mgmt frames with non-AP handle 0x5560bdd6ff60
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=0104
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=040a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=040b
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=040c
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=040d
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=090a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=090b
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=090c
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=090d
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=0409506f9a09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=7f506f9a09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=0409506f9a1a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=0801
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=12
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=06
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=0a07
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=0a11
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=0a1a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=1101
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=1102
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=0505
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x5560bdd6ff60 match=0500
rfkill: initial event: idx=3 type=1 op=0 soft=0 hard=0
netlink: Operstate: ifindex=4 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
Add interface wlp0s20u2 to a new radio phy3
nl80211: Regulatory information - country=US (DFS-FCC)
nl80211: 2402-2472 @ 40 MHz 30 mBm
nl80211: 5170-5250 @ 80 MHz 23 mBm
nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
nl80211: 5735-5835 @ 80 MHz 30 mBm
nl80211: 57240-71000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
nl80211: Mode IEEE 802.11a: 5180 5190 5200 5210 5220 5230 5240 5250[DISABLED] 5260[RADAR] 5270[RADAR] 5280[RADAR] 5290[RADAR] 5300[RADAR] 5310[RADAR] 5320[RADAR] 5500[RADAR] 5510[RADAR] 5520[RADAR] 5530[RADAR] 5540[RADAR]
nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
wlp0s20u2: Own MAC address: 9c:ef:d5:fd:d0:9c
wpa_driver_nl80211_set_key: ifindex=4 (wlp0s20u2) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 (wlp0s20u2) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 (wlp0s20u2) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 (wlp0s20u2) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 (wlp0s20u2) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 (wlp0s20u2) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
wlp0s20u2: RSN: flushing PMKID list in the driver
nl80211: Flush PMKIDs
wlp0s20u2: Setting scan request: 0.100000 sec
TDLS: TDLS operation not supported by driver
TDLS: Driver uses internal link setup
TDLS: Driver does not support TDLS channel switching
wlp0s20u2: WPS: UUID based on MAC address: fbc2aaac-4499-5771-b818-46d4889febfe
ENGINE: Loading builtin engines
ENGINE: Loading builtin engines
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
wlp0s20u2: Added interface wlp0s20u2
wlp0s20u2: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp0s20u2 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
RTM_NEWLINK: ifi_index=4 ifname=wlp0s20u2 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
wlp0s20u2: State: DISCONNECTED -> SCANNING
wlp0s20u2: Starting AP scan for wildcard SSID
wlp0s20u2: Add radio work 'scan'@0x5560bdd9be60
wlp0s20u2: First radio work item in the queue - schedule start immediately
wlp0s20u2: Starting radio work 'scan'@0x5560bdd9be60 after 0.000028 second wait
wlp0s20u2: nl80211: scan request
Scan requested (ret=0) - scan timeout 10 seconds
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp0s20u2
wlp0s20u2: nl80211: Scan trigger
wlp0s20u2: Event SCAN_STARTED (47) received
wlp0s20u2: Own scan request started a scan in 0.000142 seconds
EAPOL: disable timer tick
RTM_NEWLINK: ifi_index=4 ifname=wlp0s20u2 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp0s20u2
wlp0s20u2: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 5180 5190 5200 5210 5220 5230 5240 5260 5270 5280 5290 5300 5310 5320 5500 5510 5520 5530 5540 5550 5560 5570 5580 5590 5600 5610 5620 5630 5640 5650 5660 5670 5680 5690 5700 5745 5755 5765
wlp0s20u2: Event SCAN_RESULTS (3) received
wlp0s20u2: Scan completed in 6.325959 seconds
nl80211: Received scan results (27 BSSes)
wlp0s20u2: BSS: Start scan result update 1
wlp0s20u2: BSS: Add new id 0 BSSID 98:da:c4:98:d1:fe SSID 'DINGO' freq 5745
wlp0s20u2: BSS: Add new id 1 BSSID fc:01:7c:be:02:ed SSID 'HOOHOOHOOSIERS-5G' freq 5765
wlp0s20u2: BSS: Add new id 2 BSSID 98:de:d0:bf:c0:32 SSID 'magdelena' freq 5180
wlp0s20u2: BSS: Add new id 3 BSSID 44:1c:a8:d4:77:87 SSID 'Sands Family 5G' freq 5785
wlp0s20u2: BSS: Add new id 4 BSSID ac:ec:80:18:be:c5 SSID 'Shaft-5G' freq 5180
wlp0s20u2: BSS: Add new id 5 BSSID 98:de:d0:bf:ff:9f SSID 'magdelena' freq 2437
wlp0s20u2: BSS: Add new id 6 BSSID dc:ef:09:af:3a:49 SSID 'chae_2GEXT' freq 2417
wlp0s20u2: BSS: Add new id 7 BSSID fc:01:7c:be:02:ee SSID 'HOOHOOHOOSIERS' freq 2462
wlp0s20u2: BSS: Add new id 8 BSSID 44:1c:a8:d4:77:86 SSID 'Sands Family Guest' freq 2412
wlp0s20u2: BSS: Add new id 9 BSSID b8:ee:0e:ad:f8:1a SSID 'MySpectrumWiFi14-2G' freq 2437
wlp0s20u2: BSS: Add new id 10 BSSID ac:ec:80:18:be:c0 SSID 'Shaft' freq 2437
wlp0s20u2: BSS: Add new id 11 BSSID e8:9e:b4:62:6b:7d SSID 'WIFI626B78' freq 2462
wlp0s20u2: BSS: Add new id 12 BSSID 50:46:5d:6b:e2:70 SSID 'Anacata' freq 2462
wlp0s20u2: BSS: Add new id 13 BSSID 70:54:25:fe:a0:4c SSID 'el limon' freq 2437
wlp0s20u2: BSS: Add new id 14 BSSID b8:ee:0e:ad:f8:1b SSID 'MySpectrumWiFi14-5G' freq 5785
wlp0s20u2: BSS: Add new id 15 BSSID a0:64:8f:8b:fe:4e SSID 'MySpectrumWiFi4f-5G' freq 5805
wlp0s20u2: BSS: Add new id 16 BSSID 84:a0:6e:af:49:4f SSID 'MySpectrumWiFi48-5G' freq 5180
wlp0s20u2: BSS: Add new id 17 BSSID 70:54:25:fe:a0:4d SSID 'el limon-5g' freq 5240
wlp0s20u2: BSS: Add new id 18 BSSID 28:9e:fc:61:01:47 SSID 'Naruto-5G' freq 5745
wlp0s20u2: BSS: Add new id 19 BSSID 14:ab:f0:c6:56:e5 SSID 'TG1672GE2-5G' freq 5220
wlp0s20u2: BSS: Add new id 20 BSSID 88:71:b1:83:2d:44 SSID 'Hermes-5G' freq 5240
wlp0s20u2: BSS: Add new id 21 BSSID 1c:b0:44:f5:a1:bc SSID 'MySpectrumWiFibd-5G' freq 5805
wlp0s20u2: BSS: Add new id 22 BSSID d6:6a:91:7c:b3:67 SSID '' freq 2437
wlp0s20u2: BSS: Add new id 23 BSSID b0:c2:87:42:04:ca SSID 'TC8717TC4' freq 2412
wlp0s20u2: BSS: No SSID IE included for 18:e8:29:74:6f:bc
wlp0s20u2: BSS: Add new id 24 BSSID fa:8f:ca:99:ff:49 SSID 'Shed TV.b' freq 2437
wlp0s20u2: BSS: Add new id 25 BSSID 9a:fc:11:fa:2e:ea SSID 'Aldworth-guest' freq 2422
BSS: last_scan_res_used=26/32
wlp0s20u2: New scan results available (own=1 ext=0)
WPS: AP 98:da:c4:98:d1:fe type 0 added
WPS: AP fc:01:7c:be:02:ed type 0 added
WPS: AP 44:1c:a8:d4:77:87 type 0 added
WPS: AP ac:ec:80:18:be:c5 type 0 added
WPS: AP dc:ef:09:af:3a:49 type 0 added
WPS: AP fc:01:7c:be:02:ee type 0 added
WPS: AP 44:1c:a8:d4:77:86 type 0 added
WPS: AP ac:ec:80:18:be:c0 type 0 added
WPS: AP e8:9e:b4:62:6b:7d type 0 added
WPS: AP 50:46:5d:6b:e2:70 type 0 added
WPS: AP 70:54:25:fe:a0:4c type 0 added
WPS: AP a0:64:8f:8b:fe:4e type 0 added
WPS: AP 70:54:25:fe:a0:4d type 0 added
WPS: AP 14:ab:f0:c6:56:e5 type 0 added
WPS: AP 88:71:b1:83:2d:44 type 0 added
WPS: AP 1c:b0:44:f5:a1:bc type 0 added
WPS: AP b0:c2:87:42:04:ca type 0 added
WPS: AP[0] 98:da:c4:98:d1:fe type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] fc:01:7c:be:02:ed type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[2] 44:1c:a8:d4:77:87 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[3] ac:ec:80:18:be:c5 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[4] dc:ef:09:af:3a:49 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[5] fc:01:7c:be:02:ee type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[6] 44:1c:a8:d4:77:86 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[7] ac:ec:80:18:be:c0 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[8] e8:9e:b4:62:6b:7d type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[9] 50:46:5d:6b:e2:70 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[10] 70:54:25:fe:a0:4c type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[11] a0:64:8f:8b:fe:4e type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[12] 70:54:25:fe:a0:4d type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[13] 14:ab:f0:c6:56:e5 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[14] 88:71:b1:83:2d:44 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[15] 1c:b0:44:f5:a1:bc type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[16] b0:c2:87:42:04:ca type=0 tries=0 last_attempt=-1 sec ago blacklist=0
wlp0s20u2: Radio work 'scan'@0x5560bdd9be60 done in 6.330232 seconds
wlp0s20u2: radio_work_free('scan'@0x5560bdd9be60): num_active_works --> 0
wlp0s20u2: Selecting BSS from priority group 0
wlp0s20u2: 0: 98:da:c4:98:d1:fe ssid='DINGO' wpa_ie_len=26 rsn_ie_len=24 caps=0x1511 level=-58 freq=5745  wps
wlp0s20u2:    selected based on RSN IE
wlp0s20u2:    selected BSS 98:da:c4:98:d1:fe ssid='DINGO'
wlp0s20u2: Considering connect request: reassociate: 0  selected: 98:da:c4:98:d1:fe  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0x5560bdd70400  current_ssid=(nil)
wlp0s20u2: Request association with 98:da:c4:98:d1:fe
TDLS: TDLS is allowed in the target BSS
TDLS: TDLS channel switch allowed in the target BSS
wlp0s20u2: No ongoing scan/p2p-scan found to abort
wlp0s20u2: Add radio work 'sme-connect'@0x5560bdd9be60
wlp0s20u2: First radio work item in the queue - schedule start immediately
RSN: Ignored PMKID candidate without preauth flag
wlp0s20u2: Starting radio work 'sme-connect'@0x5560bdd9be60 after 0.000033 second wait
wlp0s20u2: WPA: clearing own WPA/RSN IE
wlp0s20u2: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0
RSN: Search for BSSID 98:da:c4:98:d1:fe
RSN: No PMKSA cache entry found
wlp0s20u2: RSN: using IEEE 802.11i/D9.0
wlp0s20u2: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
wlp0s20u2: WPA: Selected mgmt group cipher 32
WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
wlp0s20u2: WPA: AP group 0x8 network profile group 0x18; available group 0x8
wlp0s20u2: WPA: using GTK TKIP
wlp0s20u2: WPA: AP pairwise 0x18 network profile pairwise 0x18; available pairwise 0x18
wlp0s20u2: WPA: using PTK CCMP
wlp0s20u2: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available key_mgmt 0x2
wlp0s20u2: WPA: using KEY_MGMT WPA-PSK
wlp0s20u2: WPA: AP mgmt_group_cipher 0x20 network profile mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0
wlp0s20u2: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
RRM: Determining whether RRM can be used - device support: 0x10
RRM: Adding RRM IE to Association Request
Added supported operating classes IE - hexdump(len=19): 3b 11 7c 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlp0s20u2: Cancelling scan request
wlp0s20u2: SME: Trying to authenticate with 98:da:c4:98:d1:fe (SSID='DINGO' freq=5745 MHz)
EAPOL: External notification - portValid=0
wlp0s20u2: State: SCANNING -> AUTHENTICATING
Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network
wlp0s20u2: Determining shared radio frequencies (max len 1)
wlp0s20u2: Shared frequencies (len=0): completed iteration
nl80211: Authenticate (ifindex=4)
  * bssid=98:da:c4:98:d1:fe
  * freq=5745
  * SSID=DINGO
  * IEs - hexdump(len=0): [NULL]
  * Auth Type 0
nl80211: Authentication request send successfully
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp0s20u2
nl80211: New station 98:da:c4:98:d1:fe
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp0s20u2
nl80211: Authenticate event
wlp0s20u2: Event AUTH (10) received
wlp0s20u2: SME: Authentication response: peer=98:da:c4:98:d1:fe auth_type=0 auth_transaction=2 status_code=0
SME: Association Request IEs - hexdump(len=58): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 7f 08 00 00 00 00 01 00 00 40 46 05 70 00 00 00 00 3b 11 7c 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f
wlp0s20u2: Trying to associate with 98:da:c4:98:d1:fe (SSID='DINGO' freq=5745 MHz)
wlp0s20u2: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp0s20u2 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Associate (ifindex=4)
  * bssid=98:da:c4:98:d1:fe
  * freq=5745
  * SSID=DINGO
  * IEs - hexdump(len=58): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 7f 08 00 00 00 00 01 00 00 40 46 05 70 00 00 00 00 3b 11 7c 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f
  * WPA Versions 0x2
  * pairwise=0xfac04
  * group=0xfac02
  * akm=0xfac02
  * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
  * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
RTM_NEWLINK: ifi_index=4 ifname=wlp0s20u2 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=4 ifname=wlp0s20u2 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=4 ifname=wlp0s20u2 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=4 ifname=wlp0s20u2 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp0s20u2
nl80211: Associate event
nl80211: Associated on 5745 MHz
nl80211: Associated with 98:da:c4:98:d1:fe
nl80211: Set drv->ssid based on scan res info to 'DINGO'
wlp0s20u2: Event ASSOC (0) received
wlp0s20u2: Association info event
req_ies - hexdump(len=116): 00 05 44 49 4e 47 4f 01 08 0c 12 18 24 30 48 60 6c 21 02 00 1e 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 2d 1a fe 02 13 ff ff 00 00 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 01 00 00 40 46 05 70 00 00 00 00 3b 11 7c 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=157): 01 08 8c 12 98 24 b0 48 60 6c 46 05 73 d0 00 00 0c 2d 1a ef 09 03 ff ff ff 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 95 05 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4a 0e 14 00 0a 00 2c 01 c8 00 14 00 05 00 19 00 7f 08 05 00 0f 02 00 00 00 40 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 08 8c fd f0 01 01 02 01 00 dd 18 00 50 f2 04 10 4a 00 01 10 10 3b 00 01 03 10 49 00 06 00 37 2a 00 01 20
wlp0s20u2: freq=5745 MHz
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
wlp0s20u2: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp0s20u2 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp0s20u2: Associated to a new BSS: BSSID=98:da:c4:98:d1:fe
wlp0s20u2: Associated with 98:da:c4:98:d1:fe
wlp0s20u2: WPA: Association event - clear replay counter
wlp0s20u2: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
wlp0s20u2: Setting authentication timeout: 10 sec 0 usec
wlp0s20u2: Cancelling scan request
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
wlp0s20u2: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp0s20u2
nl80211: Ignore connect event (cmd=46) when using userspace SME
l2_packet_receive: src=98:da:c4:98:d1:fe len=99
wlp0s20u2: RX EAPOL from 98:da:c4:98:d1:fe
wlp0s20u2: Setting authentication timeout: 10 sec 0 usec
wlp0s20u2: IEEE 802.1X RX: version=2 type=3 length=95
wlp0s20u2:   EAPOL-Key type=2
wlp0s20u2:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
wlp0s20u2:   key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): ab 3b a8 6d 25 01 6a 6c 65 35 5c cf 3e ac c4 50 3f 78 08 cd b6 b4 13 b2 9e 63 31 70 15 2d f2 26
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlp0s20u2: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlp0s20u2: WPA: RX message 1 of 4-Way Handshake from 98:da:c4:98:d1:fe (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 68 cb 48 c7 51 4d f6 df d2 85 0c f5 53 40 80 2b 56 4f 79 cc c7 1f 1f 3a 6f bc cc c4 38 a9 a6 0e
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=9c:ef:d5:fd:d0:9c A2=98:da:c4:98:d1:fe
WPA: Nonce1 - hexdump(len=32): 68 cb 48 c7 51 4d f6 df d2 85 0c f5 53 40 80 2b 56 4f 79 cc c7 1f 1f 3a 6f bc cc c4 38 a9 a6 0e
WPA: Nonce2 - hexdump(len=32): ab 3b a8 6d 25 01 6a 6c 65 35 5c cf 3e ac c4 50 3f 78 08 cd b6 b4 13 b2 9e 63 31 70 15 2d f2 26
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlp0s20u2: WPA: Sending EAPOL-Key 2/4
WPA: Send EAPOL-Key frame to 98:da:c4:98:d1:fe ver=2 mic_len=16 key_mgmt=0x2
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): f6 82 e9 5a 80 2b 92 d7 a3 15 5c f8 3a 71 a4 af
l2_packet_receive: src=98:da:c4:98:d1:fe len=203
wlp0s20u2: RX EAPOL from 98:da:c4:98:d1:fe
wlp0s20u2: IEEE 802.1X RX: version=2 type=3 length=199
wlp0s20u2:   EAPOL-Key type=2
wlp0s20u2:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
wlp0s20u2:   key_length=16 key_data_length=104
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): ab 3b a8 6d 25 01 6a 6c 65 35 5c cf 3e ac c4 50 3f 78 08 cd b6 b4 13 b2 9e 63 31 70 15 2d f2 26
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 14 0f 07 93 db d5 27 76 ff bc 83 0c c0 d9 a2 5f
WPA: EAPOL-Key MIC using HMAC-SHA1
RSN: encrypted key data - hexdump(len=104): 0e 6c 6b 87 b4 cf 69 05 f6 90 5e cb b6 30 d8 16 96 16 8e 04 e4 50 d6 a0 b9 69 34 f2 81 e5 e0 45 ce 8c 98 1c 02 97 45 56 94 ff 6b 6f 88 d3 c0 94 36 83 af 18 6a 50 57 14 85 52 ed 36 fd 62 7d 84 77 4c f5 90 45 60 c2 ee 5c 58 dd 91 db de c5 59 71 39 80 59 22 98 28 fc d8 cc 40 0f 64 79 60 d0 22 69 a1 08 c6 93 6e ca
WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED]
wlp0s20u2: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
wlp0s20u2: WPA: RX message 3 of 4-Way Handshake from 98:da:c4:98:d1:fe (ver=2)
WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 01 00 f1 e7 50 43 1c f8 95 7a 19 fd e5 29 d0 bc 03 b7 6d 13 4c 9d 31 e7 41 cf 9f 0d 34 dc a1 6d 0e dc dd 00
WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
WPA: WPA IE in EAPOL-Key - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED]
wlp0s20u2: WPA: Sending EAPOL-Key 4/4
WPA: Send EAPOL-Key frame to 98:da:c4:98:d1:fe ver=2 mic_len=16 key_mgmt=0x2
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 64 f0 60 3a 73 21 aa 55 2d 57 7d 28 0b f2 6f 1d
wlp0s20u2: WPA: Installing PTK to the driver
wpa_driver_nl80211_set_key: ifindex=4 (wlp0s20u2) alg=3 addr=0x5560bdd70ff8 key_idx=0 set_tx=1 seq_len=6 key_len=16
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
   addr=98:da:c4:98:d1:fe
EAPOL: External notification - portValid=1
wlp0s20u2: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
WPA: Group Key - hexdump(len=32): [REMOVED]
wlp0s20u2: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32)
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_nl80211_set_key: ifindex=4 (wlp0s20u2) alg=2 addr=0x5560bd0649c9 key_idx=1 set_tx=0 seq_len=6 key_len=32
nl80211: KEY_DATA - hexdump(len=32): [REMOVED]
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
   broadcast key
wlp0s20u2: WPA: Key negotiation completed with 98:da:c4:98:d1:fe [PTK=CCMP GTK=TKIP]
wlp0s20u2: Cancelling authentication timeout
wlp0s20u2: State: GROUP_HANDSHAKE -> COMPLETED
wlp0s20u2: Radio work 'sme-connect'@0x5560bdd9be60 done in 0.338474 seconds
wlp0s20u2: radio_work_free('sme-connect'@0x5560bdd9be60): num_active_works --> 0
wlp0s20u2: CTRL-EVENT-CONNECTED - Connection to 98:da:c4:98:d1:fe completed [id=0 id_str=]
nl80211: Set wlp0s20u2 operstate 0->1 (UP)
netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
nl80211: Set supplicant port authorized for 98:da:c4:98:d1:fe
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed - result=SUCCESS
nl80211: Set rekey offload
nl80211: Driver does not support rekey offload
RTM_NEWLINK: ifi_index=4 ifname=wlp0s20u2 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
nl80211: Drv Event 64 (NL80211_CMD_NOTIFY_CQM) received for wlp0s20u2
nl80211: Beacon loss event
wlp0s20u2: Event BEACON_LOSS (53) received
wlp0s20u2: CTRL-EVENT-BEACON-LOSS 
RTM_NEWLINK: ifi_index=4 ifname=wlp0s20u2 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp0s20u2
nl80211: Delete station 98:da:c4:98:d1:fe
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp0s20u2
nl80211: Deauthenticate event
wlp0s20u2: Event DEAUTH (11) received
wlp0s20u2: Deauthentication notification
wlp0s20u2:  * reason 4 (DISASSOC_DUE_TO_INACTIVITY) locally_generated=1
wlp0s20u2:  * address 98:da:c4:98:d1:fe
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp0s20u2: CTRL-EVENT-DISCONNECTED bssid=98:da:c4:98:d1:fe reason=4 locally_generated=1
wlp0s20u2: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9)
wlp0s20u2: Setting scan request: 0.100000 sec
Added BSSID 98:da:c4:98:d1:fe into blacklist
wlp0s20u2: Blacklist count 1 --> request scan in 100 ms
wlp0s20u2: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner
TDLS: Remove peers on disassociation
wlp0s20u2: WPA: Clear old PMK and PTK
wlp0s20u2: Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=4 (wlp0s20u2) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 (wlp0s20u2) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 (wlp0s20u2) alg=0 addr=0x5560bdd6dd00 key_idx=0 set_tx=0 seq_len=0 key_len=0
   addr=98:da:c4:98:d1:fe
nl80211: Data frame filter flags=0x0
wlp0s20u2: State: COMPLETED -> DISCONNECTED
nl80211: Set wlp0s20u2 operstate 1->0 (DORMANT)
netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
wlp0s20u2: BSS: Remove id 0 BSSID 98:da:c4:98:d1:fe SSID 'DINGO' due to Connection to AP lost

Thank you in advance for any help with this!

Offline

Board footer

Powered by FluxBB