RTL8192cu AP mode in linux
First day - bleak output.This page does not yet report success, it is merely about my hunt for success (eventually I did have success, but not with the original 8192 dongle). I bought one of these wireless USB dongles because it was really cheap, and the reviews reported success using it as an access point (but they only mentioned windows, not linux, so it was a gamble). I tried it out on a Windows XP box, and it worked great there, both to connect to an access point and as an access point when switched to AP mode using the realtek software. The windows driver name was RTL8192cu, which was a pretty good hint about the chipset. The question was then, can I make it work on my Fedora 14 linux box? Plugging it in to a unmodified Fedora 14, shows the answer is at least "Not right out of the box." There does not appear to be any driver for the device in fedora yet. If I go to the Realtek
home page and search for RTL8192cu, I can read about it
here, and follow the link to the
downloads page for it, where I find the
In a different goose chase, I found the hostapd home page URL in the rpm info for the hostapd rpm I installed on my system. Going there and reading up on hostapd (which appears to be the linux way of running an access point unless maybe it is obsolete which, also with linux, is always possible but a google for alternatives didn't turn up any pointers). Visiting that site, points me at mac80211, which appears to be the common interface everything is supposed to use to talk access point to lower level drivers (or something like that, I got lost a while back). Anyway, visitng one more link takes me to the list of drivers and their capabilities, and the row in that table for r8192cu says that the driver supports the config capability, but ominously has question marks in other columns for AP mode operation. I think the realtek driver I found above is the same as the driver this table is talking about (but I'm really unsure about that). I did find some driver source for r8192cu from a repo being prepared for centos 6, and looking at that source, it certainly appeared to have originated from the same realtek source code. Anyway, using this driver, and the NetworkManager app from a gnome session on fedora 14, I was indeed able to connect to my access point, so the driver works great for normal NIC-like usage, and at least the question marks in the table leave some hope :-). So I proceeded to try and configure hostapd, putting some mysterious gibberish I found on the web in /etc/hostapd/hostapd.conf When I try hostapd it doesn't work at all, but I eventually figure out I need to first run: modprobe mac80211 It still doesn't work for not very well explained reasons, so I compile the latest stable hostapd-0.7.3 from the tarball and run it. It still doesn't work, but I get more detailed gibberish. And that's it. I have exhausted all my know-how, so it looks bleak at the moment. The source code for the driver is full of references to AP mode, so it looks like it tries to support it. In case it is useful for anyone, here is the dmesg output Day two - the hints start coming inObviously it was time to hit the mailing lists, and this thread in the linux wireless mailing list got me making lots of progress. In particular the pointer to the compat-wireless source code worked wonders. It was not trivial, but I got it to compile on my Fedora 14 box. I
had to back out the changes in the latest snapshot (2011-05-05 at the
time I grabbed it) that called kfree_rcu and replace the calls
with the older code that would compile with the fedora kernel headers
(which do not define that routine). I also had to find and remove the
vzalloc implementation in the Anyway, after building and installing (and rebooting for good measure) all this stuff. I can plug in the dongle and see lots more output from hostapd, and even connect my phone briefly (but then it gets disconnected). So it is definitely looking like this may work someday, but isn't quite there yet (it might even work now if I knew exactly what to try, I suspect trying it without encryption might function better). Day three - limited successI decided to get as much junk out of the way as possible, and produced this minimal config file from web searches and random guessing :-). This brings up the access point with absolutely no security, and it connects to my bridge br0 that I already use for virtual machine networking. My netgear DD-WRT router is already setup to assign IP addresses via DHCP on that subnet. When I plug in the dongle and start hostapd pointing to the minimal config, my phone can indeed connect and even gets assigned an IP, but about every 10 or 15 seconds it disconnects and reconnects. While it is connected though, I can go into the browser and access web pages, and it seems to function well for those few seconds. When I look at /var/log/messages I see lots of repeated messages at the same frequency the phone is connecting and disconnecting. I also see similar looking repeated messages in the hostapd debug output. A new dongle and complete success!The still experimental driver for my original dongle resulted in all the effort you see above, but in this thread in the Fedora users mailing list someone mentioned that the Belkin F5D7050 could operate as an access point in existing fedora versions, so I ordered one to give it a whirl. There were plenty of scathing reviews on the amazon site, and I've never found Belkin products to be very reliable, but in this case, it worked like a charm! I can plug it in, and run my ap-up script, and my desktop becomes an access point. When I no longer need it, I can run the ap-down script and reverse the effects of the up script. Those scripts start and stop various services which need to be configured. The /etc/hostapd/hostapd.conf file is used to run the access point with WPA2 security and disables the SSID broadcast so some random member of the IT department won't happen to notice it in a casual scan :-). This config uses channel 11 because I downloaded the OM Simple Wifi Scanner app for my android phone and used it to determine which channel numbers were already in use for visible access points in the area. Channel 11 was far away from all of them, so I picked it. For hostapd to be able to assign IP addresses to devices that connect to my desktop, I needed to run a small private network from my desktop and provide a dhcp server to assign IP addresses. The dhcpd server uses the /etc/dhcp/dhcpd.conf file and assigns addresses in the private subnet 192.168.9.0/24 (9 picked pretty much at random). The router spec in the config uses 192.168.9.1, which is the IP the ifconfig command in the ap-up script gives to the wlan0 interface which is the usb dongle (wlan0 was the name assigned by fedora when I first plugged it in). For it to actually function as a router, I need to enable IP forwarding, which I do in the /etc/sysctl.conf file. (Maybe I should turn this on and off in the ap-up and ap-down scripts, but it doesn't seem to hurt anything to leave it on all the time.) Finally, for the connected devices to get to any machine other than my desktop, I need to run a NAT firewall on the system. If you normally run other firewall rules as well, this might get tricky, but I normally have no firewall, so I just configured NAT in /etc/sysconfig/iptables and turn the iptables service on and off in the up and down scripts to enable or disable NAT. |
ap-up script to start access point
#!/bin/sh # # Run as root - brings up the access point # ifconfig wlan0 netmask 255.255.255.0 192.168.9.1 service iptables start service dhcpd start service hostapd start
ap-down script to stop access point
#!/bin/sh # # Run as root - brings down the access point # service hostapd stop service dhcpd stop service iptables stop
Working /etc/hostapd/hostapd.conf file
ctrl_interface=/var/run/hostapd ctrl_interface_group=root macaddr_acl=0 auth_algs=1 ignore_broadcast_ssid=1 wpa=2 wpa_key_mgmt=WPA-PSK wpa_pairwise=TKIP rsn_pairwise=CCMP wpa_passphrase=YourPassphraseHere driver=nl80211 interface=wlan0 bridge=br0 driver=nl80211 hw_mode=g channel=11 ssid=YourSSIDHere
Working /etc/dhcp/dhcpd.conf file
option domain-name-servers YourDNSIPAddrHere; option routers 192.168.9.1; default-lease-time 86400; ignore client-updates; subnet 192.168.9.0 netmask 255.255.255.0 { range 192.168.9.2 192.168.9.254; default-lease-time 86400; max-lease-time 86400; }
Lines from /etc/sysctl.conf for forwarding
# Controls IP packet forwarding net.ipv4.ip_forward = 1
/etc/sysconfig/iptables for NAT
# Generated by iptables-save v1.4.9 on Fri May 20 09:58:26 2011 *nat :PREROUTING ACCEPT [34:2176] :OUTPUT ACCEPT [55:4168] :POSTROUTING ACCEPT [55:4168] -A POSTROUTING -o eth0 -j MASQUERADE COMMIT # Completed on Fri May 20 09:58:26 2011 # Generated by iptables-save v1.4.9 on Fri May 20 09:58:26 2011 *filter :INPUT ACCEPT [392008:153506294] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [364620:51248845] COMMIT # Completed on Fri May 20 09:58:26 2011
ctrl_interface=/var/run/hostapd ctrl_interface_group=hostapd macaddr_acl=0 auth_algs=1 ignore_broadcast_ssid=0 wpa=2 wpa_key_mgmt=WPA-PSK wpa_pairwise=TKIP rsn_pairwise=CCMP wpa_passphrase=NotReallyMyPassphrase driver=nl80211 interface=wlan0 bridge=br0 driver=nl80211 hw_mode=g channel=1 ssid=NotReallyMySsid
Configuration file: /etc/hostapd/hostapd.conf ctrl_interface_group=501 (from group name 'hostapd') nl80211: Register Action command failed: ret=-19 (No such device) nl80211: Register Action match - hexdump(len=1): 06 nl80211: Failed to register Action frame processing - ignore for now nl80211: Add own interface ifindex 3 nl80211: Add own interface ifindex 5 nl80211: Failed to set interface 5 to mode 3: -19 (No such device) nl80211: Failed to set interface 5 to mode 3: -19 (No such device) nl80211: Interface mode change to 3 from 0 failed nl80211: Failed to set interface wlan0 into AP mode nl80211 driver initialization failed. rmdir[ctrl_interface]: No such file or directory ELOOP: remaining socket: sock=4 eloop_data=0x13230d0 user_data=0x1324a90 handler=0x42b060 ELOOP: remaining socket: sock=6 eloop_data=0x1326fd0 user_data=(nil) handler=0x4341f0
[ 3235.329672] cfg80211: Calling CRDA to update world regulatory domain [ 3235.372709] cfg80211: World regulatory domain updated: [ 3235.372712] (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp) [ 3235.372715] (2402000 KHz - 2472000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) [ 3235.372718] (2457000 KHz - 2482000 KHz @ 20000 KHz), (300 mBi, 2000 mBm) [ 3235.372721] (2474000 KHz - 2494000 KHz @ 20000 KHz), (300 mBi, 2000 mBm) [ 3235.372724] (5170000 KHz - 5250000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) [ 3235.372727] (5735000 KHz - 5835000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) [ 3250.865055] usb 2-5: new high speed USB device using ehci_hcd and address 6 [ 3250.980772] usb 2-5: New USB device found, idVendor=0bda, idProduct=8176 [ 3250.980776] usb 2-5: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3250.980780] usb 2-5: Product: 802.11n WLAN Adapter [ 3250.980782] usb 2-5: Manufacturer: Realtek [ 3250.980784] usb 2-5: SerialNumber: 00e04c000001 [ 3251.292441] rtw driver version=v2.0.1324.20110126 [ 3251.292488] register rtl8192_netdev_ops to netdev_ops [ 3251.292490] [ 3251.292491] 8192_usb_endpoint_descriptor(0): [ 3251.292492] bLength=7 [ 3251.292493] bDescriptorType=5 [ 3251.292494] bEndpointAddress=81 [ 3251.292495] wMaxPacketSize=200 [ 3251.292496] bInterval=0 [ 3251.292497] [ 3251.292498] 8192_usb_endpoint_descriptor(1): [ 3251.292499] bLength=7 [ 3251.292500] bDescriptorType=5 [ 3251.292501] bEndpointAddress=2 [ 3251.292502] wMaxPacketSize=200 [ 3251.292503] bInterval=0 [ 3251.292504] [ 3251.292504] 8192_usb_endpoint_descriptor(2): [ 3251.292506] bLength=7 [ 3251.292507] bDescriptorType=5 [ 3251.292508] bEndpointAddress=3 [ 3251.292509] wMaxPacketSize=200 [ 3251.292510] bInterval=0 [ 3251.292511] [ 3251.292511] 8192_usb_endpoint_descriptor(3): [ 3251.292512] bLength=7 [ 3251.292513] bDescriptorType=5 [ 3251.292514] bEndpointAddress=84 [ 3251.292515] wMaxPacketSize=40 [ 3251.292516] bInterval=1 [ 3251.292518] nr_endpoint=4, in_num=2, out_num=2 [ 3251.292518] [ 3251.292519] 8192cu: USB_SPEED_HIGH [ 3251.292655] Chip Version ID: VERSION_NORMAL_TSMC_CHIP_88C. [ 3251.293344] EEPROM type is E-FUSE [ 3251.293347] ====> ReadAdapterInfo8192C [ 3251.293402] Boot from EFUSE, Autoload Success ! [ 3251.298661] rtw_efuse_get_max_phy_size...eeprompriv.efuse_phy_max_size(504) [ 3251.694183] EEPROMVID = 0x0bda [ 3251.694185] EEPROMPID = 0x8176 [ 3251.694187] EEPROMCustomerID : 0x00 [ 3251.694189] EEPROMSubCustomerID: 0x00 [ 3251.694190] RT_CustomerID: 0x00 [ 3251.694193] RT_ChannelPlan: 0x02 [ 3251.694194] _ReadBoardType(0) [ 3251.694196] ### AntDivCfg(0) [ 3251.694198] BT Coexistance = disable [ 3251.694200] _ReadHWPDSelection...bHWPwrPindetect(0)-bHWPowerdown(0) ,bSupportRemoteWakeup(0) [ 3251.694203] ### PS params=> power_mgnt(0),usbss_enable(0) ### [ 3251.694205] _InitAdapterVariablesByPROM(): REPLACEMENT = 0 [ 3251.694207] <==== ReadAdapterInfo8192C [ 3251.694213] MAC Address from efuse= 00:a1:b0:30:25:06 [ 3251.694493] usbcore: registered new interface driver rtw_usb_drv [ 3280.674194] +8192cu_drv - drv_open, bup=0 [ 3280.749707] ===> FirmwareDownload91C() fw:Rtl819XFwImageArray_TSMC [ 3280.749715] fw_ver=v60, fw_subver=0, sig=0x88c0 [ 3280.784954] fw download ok! [ 3280.784957] Set RF Chip ID to RF_6052 and RF type to 1T1R. [ 3280.784959] rf_chip=0x4, rf_type=0x3 [ 3281.133722] IQK:Start!!! [ 3281.144597] Path A IQK Success!! [ 3281.152225] Path A IQK Success!! [ 3281.156850] IQK: final_candidate is 0 [ 3281.156854] IQK: RegE94=102 RegE9C=13 RegEA4=fe RegEAC=0 RegEB4=0 RegEBC=0 RegEC4=0 RegECC=0 [ 3281.156855] Path A IQ Calibration Success ! [ 3281.265733] MAC Address from REG = 0-a1-b0-30-25-6 [ 3281.266607] pdmpriv->TxPowerTrackControl = 1 [ 3281.266982] MAC Address = 0-a1-b0-30-25-6 [ 3281.270864] -871x_drv - drv_open, bup=1 [ 3281.272813] ADDRCONF(NETDEV_UP): wlan0: link is not ready
--- compat-wireless-2011-05-05/compat/compat-2.6.37.c 2011-05-05 15:04:45.000000000 -0400 +++ compat-wireless-2011-05-05/compat/compat-2.6.37.c 2011-05-06 17:21:09.000000000 -0400 @@ -334,24 +334,4 @@ } EXPORT_SYMBOL(compat_led_classdev_unregister); -/** - * vzalloc - allocate virtually contiguous memory with zero fill - * @size: allocation size - * Allocate enough pages to cover @size from the page level - * allocator and map them into contiguous kernel virtual space. - * The memory allocated is set to zero. - * - * For tight control over page level allocator and protection flags - * use __vmalloc() instead. - */ -void *vzalloc(unsigned long size) -{ - void *buf; - buf = vmalloc(size); - if (buf) - memset(buf, 0, size); - return buf; -} -EXPORT_SYMBOL(vzalloc); - #endif --- compat-wireless-2011-05-05/net/mac80211/agg-tx.c 2011-05-05 15:04:45.000000000 -0400 +++ compat-wireless-2011-05-05/net/mac80211/agg-tx.c 2011-05-06 17:21:59.000000000 -0400 @@ -136,6 +136,14 @@ ieee80211_tx_skb(sdata, skb); } +static void kfree_tid_tx(struct rcu_head *rcu_head) +{ + struct tid_ampdu_tx *tid_tx = + container_of(rcu_head, struct tid_ampdu_tx, rcu_head); + + kfree(tid_tx); +} + int ___ieee80211_stop_tx_ba_session(struct sta_info *sta, u16 tid, enum ieee80211_back_parties initiator, bool tx) @@ -155,7 +163,7 @@ /* not even started yet! */ rcu_assign_pointer(sta->ampdu_mlme.tid_tx[tid], NULL); spin_unlock_bh(&sta->lock); - kfree_rcu(tid_tx, rcu_head); + call_rcu(&tid_tx->rcu_head, kfree_tid_tx); return 0; } @@ -314,7 +322,7 @@ spin_unlock_bh(&sta->lock); ieee80211_wake_queue_agg(local, tid); - kfree_rcu(tid_tx, rcu_head); + call_rcu(&tid_tx->rcu_head, kfree_tid_tx); return; } @@ -693,7 +701,7 @@ ieee80211_agg_splice_finish(local, tid); - kfree_rcu(tid_tx, rcu_head); + call_rcu(&tid_tx->rcu_head, kfree_tid_tx); unlock_sta: spin_unlock_bh(&sta->lock); --- compat-wireless-2011-05-05/net/mac80211/work.c 2011-05-05 15:04:45.000000000 -0400 +++ compat-wireless-2011-05-05/net/mac80211/work.c 2011-05-06 17:21:44.000000000 -0400 @@ -65,9 +65,17 @@ mod_timer(&local->work_timer, timeout); } +static void work_free_rcu(struct rcu_head *head) +{ + struct ieee80211_work *wk = + container_of(head, struct ieee80211_work, rcu_head); + + kfree(wk); +} + void free_work(struct ieee80211_work *wk) { - kfree_rcu(wk, rcu_head); + call_rcu(&wk->rcu_head, work_free_rcu); } static int ieee80211_compatible_rates(const u8 *supp_rates, int supp_rates_len,
Configuration file: /etc/hostapd/hostapd.conf ctrl_interface_group=0 (from group name 'root') nl80211: Add own interface ifindex 3 nl80211: New interface mon.wlan0 created: ifindex=6 nl80211: Add own interface ifindex 6 nl80211: Add own interface ifindex 7 nl80211: Adding interface wlan0 into bridge br0 BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) nl80211: Added 802.11b mode based on 802.11g information Allowed channel: mode=1 chan=1 freq=2412 MHz max_tx_power=20 dBm Allowed channel: mode=1 chan=2 freq=2417 MHz max_tx_power=20 dBm Allowed channel: mode=1 chan=3 freq=2422 MHz max_tx_power=20 dBm Allowed channel: mode=1 chan=4 freq=2427 MHz max_tx_power=20 dBm Allowed channel: mode=1 chan=5 freq=2432 MHz max_tx_power=20 dBm Allowed channel: mode=1 chan=6 freq=2437 MHz max_tx_power=20 dBm Allowed channel: mode=1 chan=7 freq=2442 MHz max_tx_power=20 dBm Allowed channel: mode=1 chan=8 freq=2447 MHz max_tx_power=20 dBm Allowed channel: mode=1 chan=9 freq=2452 MHz max_tx_power=20 dBm Allowed channel: mode=1 chan=10 freq=2457 MHz max_tx_power=20 dBm Allowed channel: mode=1 chan=11 freq=2462 MHz max_tx_power=20 dBm Allowed channel: mode=0 chan=1 freq=2412 MHz max_tx_power=20 dBm Allowed channel: mode=0 chan=2 freq=2417 MHz max_tx_power=20 dBm Allowed channel: mode=0 chan=3 freq=2422 MHz max_tx_power=20 dBm Allowed channel: mode=0 chan=4 freq=2427 MHz max_tx_power=20 dBm Allowed channel: mode=0 chan=5 freq=2432 MHz max_tx_power=20 dBm Allowed channel: mode=0 chan=6 freq=2437 MHz max_tx_power=20 dBm Allowed channel: mode=0 chan=7 freq=2442 MHz max_tx_power=20 dBm Allowed channel: mode=0 chan=8 freq=2447 MHz max_tx_power=20 dBm Allowed channel: mode=0 chan=9 freq=2452 MHz max_tx_power=20 dBm Allowed channel: mode=0 chan=10 freq=2457 MHz max_tx_power=20 dBm Allowed channel: mode=0 chan=11 freq=2462 MHz max_tx_power=20 dBm RATE[0] rate=10 flags=0x1 RATE[1] rate=20 flags=0x1 RATE[2] rate=55 flags=0x1 RATE[3] rate=110 flags=0x1 RATE[4] rate=60 flags=0x0 RATE[5] rate=90 flags=0x0 RATE[6] rate=120 flags=0x0 RATE[7] rate=180 flags=0x0 RATE[8] rate=240 flags=0x0 RATE[9] rate=360 flags=0x0 RATE[10] rate=480 flags=0x0 RATE[11] rate=540 flags=0x0 Completing interface initialization Mode: IEEE 802.11g Channel: 1 Frequency: 2412 MHz Flushing old station entries Deauthenticate all stations wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=0 set_tx=1 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 Using interface wlan0 with hwaddr 00:a1:b0:30:25:06 and ssid 'Sparrow' Deriving WPA PSK based on passphrase SSID - hexdump_ascii(len=7): 53 70 61 72 72 6f 77 Sparrow PSK (ASCII passphrase) - hexdump_ascii(len=14): [REMOVED] PSK (from passphrase) - hexdump(len=32): [REMOVED] WPA: group state machine entering state GTK_INIT (VLAN-ID 0) GMK - hexdump(len=32): [REMOVED] GTK - hexdump(len=16): [REMOVED] WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=(nil) key_idx=1 set_tx=1 seq_len=0 key_len=16 nl80211: Set beacon (beacon_set=0) wlan0: Setup of interface done. RTM_NEWLINK: operstate=0 ifi_flags=0x1002 () RTM_NEWLINK, IFLA_IFNAME: Interface 'mon.wlan0' added Unknown event 5 RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'mon.wlan0' added Unknown event 5 RTM_NEWLINK: operstate=0 ifi_flags=0x1002 () RTM_NEWLINK, IFLA_IFNAME: Interface 'br0' added Unknown event 5 RTM_NEWLINK: operstate=0 ifi_flags=0x1002 () RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Unknown event 5 nl80211: Add ifindex 7 for bridge br0 nl80211: Add own interface ifindex 7 RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Unknown event 5 RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Unknown event 5 nl80211: Add ifindex 7 for bridge br0 nl80211: Add own interface ifindex 7 Unknown Broadcom information element ignored (type=52 len=26) >> These Broadcom messages repeat a lot, so I'm only leaving in a few examples << Unknown Broadcom information element ignored (type=52 len=26) Unknown Broadcom information element ignored (type=52 len=26) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for our SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for our SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for our SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for our SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for our SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for our SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for our SSID mgmt::proberesp cb mgmt::auth authentication: STA=60:a1:0a:c7:af:01 auth_alg=0 auth_transaction=1 status_code=0 wep=0 New STA wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authentication OK (open system) wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-AUTHENTICATE.indication(60:a1:0a:c7:af:01, OPEN_SYSTEM) wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-DELETEKEYS.request(60:a1:0a:c7:af:01) authentication reply: STA=60:a1:0a:c7:af:01 auth_alg=0 auth_transaction=2 resp=0 (IE len=0) mgmt::auth cb wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authenticated mgmt::assoc_req association request: STA=60:a1:0a:c7:af:01 capab_info=0x431 listen_interval=10 unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) new AID 1 wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: association OK (aid 1) mgmt::assoc_resp cb wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: associated (aid 1) wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-ASSOCIATE.indication(60:a1:0a:c7:af:01) wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-DELETEKEYS.request(60:a1:0a:c7:af:01) wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438300 key_idx=0 set_tx=1 seq_len=0 key_len=0 addr=60:a1:0a:c7:af:01 wlan0: STA 60:a1:0a:c7:af:01 WPA: event 1 notification wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438300 key_idx=0 set_tx=1 seq_len=0 key_len=0 addr=60:a1:0a:c7:af:01 wlan0: STA 60:a1:0a:c7:af:01 WPA: start authentication WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state INITIALIZE wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438300 key_idx=0 set_tx=1 seq_len=0 key_len=0 addr=60:a1:0a:c7:af:01 wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.1X: unauthorizing port WPA: 60:a1:0a:c7:af:01 WPA_PTK_GROUP entering state IDLE WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state AUTHENTICATION WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state AUTHENTICATION2 WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state INITPSK WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0) nl80211: Event message available nl80211: Ignored unknown event (cmd=19) IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1 wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0) IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1 wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0) IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1 wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0) IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1 wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state DISCONNECT hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 60:a1:0a:c7:af:01 reason 2 WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state DISCONNECTED WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state INITIALIZE wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438300 key_idx=0 set_tx=1 seq_len=0 key_len=0 addr=60:a1:0a:c7:af:01 wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.1X: unauthorizing port wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: deauthenticated due to local deauth request nl80211: Event message available nl80211: Ignored unknown event (cmd=20) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for our SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for our SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for our SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for our SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for our SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for our SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for our SSID mgmt::proberesp cb mgmt::auth authentication: STA=60:a1:0a:c7:af:01 auth_alg=0 auth_transaction=1 status_code=0 wep=0 New STA wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authentication OK (open system) wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-AUTHENTICATE.indication(60:a1:0a:c7:af:01, OPEN_SYSTEM) wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-DELETEKEYS.request(60:a1:0a:c7:af:01) authentication reply: STA=60:a1:0a:c7:af:01 auth_alg=0 auth_transaction=2 resp=0 (IE len=0) mgmt::auth cb wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authenticated mgmt::assoc_req association request: STA=60:a1:0a:c7:af:01 capab_info=0x431 listen_interval=10 unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) new AID 1 wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: association OK (aid 1) mgmt::assoc_resp cb wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: associated (aid 1) wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-ASSOCIATE.indication(60:a1:0a:c7:af:01) wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-DELETEKEYS.request(60:a1:0a:c7:af:01) wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438150 key_idx=0 set_tx=1 seq_len=0 key_len=0 addr=60:a1:0a:c7:af:01 wlan0: STA 60:a1:0a:c7:af:01 WPA: event 1 notification wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438150 key_idx=0 set_tx=1 seq_len=0 key_len=0 addr=60:a1:0a:c7:af:01 wlan0: STA 60:a1:0a:c7:af:01 WPA: start authentication WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state INITIALIZE wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438150 key_idx=0 set_tx=1 seq_len=0 key_len=0 addr=60:a1:0a:c7:af:01 wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.1X: unauthorizing port WPA: 60:a1:0a:c7:af:01 WPA_PTK_GROUP entering state IDLE WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state AUTHENTICATION WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state AUTHENTICATION2 WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state INITPSK WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0) nl80211: Event message available nl80211: Ignored unknown event (cmd=19) IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1 wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0) IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1 wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0) IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1 wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0) IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1 wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state DISCONNECT hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 60:a1:0a:c7:af:01 reason 2 WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state DISCONNECTED WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state INITIALIZE wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438150 key_idx=0 set_tx=1 seq_len=0 key_len=0 addr=60:a1:0a:c7:af:01 wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.1X: unauthorizing port wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: deauthenticated due to local deauth request nl80211: Event message available nl80211: Ignored unknown event (cmd=20) STA c4:17:fe:81:01:fa sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for our SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for our SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for our SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for our SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for our SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for our SSID mgmt::proberesp cb mgmt::auth authentication: STA=60:a1:0a:c7:af:01 auth_alg=0 auth_transaction=1 status_code=0 wep=0 New STA wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authentication OK (open system) wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-AUTHENTICATE.indication(60:a1:0a:c7:af:01, OPEN_SYSTEM) wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-DELETEKEYS.request(60:a1:0a:c7:af:01) authentication reply: STA=60:a1:0a:c7:af:01 auth_alg=0 auth_transaction=2 resp=0 (IE len=0) mgmt::auth cb wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authenticated mgmt::reassoc_req reassociation request: STA=60:a1:0a:c7:af:01 capab_info=0x431 listen_interval=10 current_ap=00:a1:b0:30:25:06 unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) new AID 1 wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: association OK (aid 1) mgmt::reassoc_resp cb wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: associated (aid 1) wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-REASSOCIATE.indication(60:a1:0a:c7:af:01) wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-DELETEKEYS.request(60:a1:0a:c7:af:01) wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438150 key_idx=0 set_tx=1 seq_len=0 key_len=0 addr=60:a1:0a:c7:af:01 wlan0: STA 60:a1:0a:c7:af:01 WPA: event 1 notification wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438150 key_idx=0 set_tx=1 seq_len=0 key_len=0 addr=60:a1:0a:c7:af:01 wlan0: STA 60:a1:0a:c7:af:01 WPA: start authentication WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state INITIALIZE wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438150 key_idx=0 set_tx=1 seq_len=0 key_len=0 addr=60:a1:0a:c7:af:01 wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.1X: unauthorizing port WPA: 60:a1:0a:c7:af:01 WPA_PTK_GROUP entering state IDLE WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state AUTHENTICATION WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state AUTHENTICATION2 WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state INITPSK WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0) nl80211: Event message available nl80211: Ignored unknown event (cmd=19) IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1 wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0) IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1 wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0) IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1 STA c4:17:fe:81:01:fa sent probe request for broadcast SSID mgmt::proberesp cb STA c4:17:fe:81:01:fa sent probe request for broadcast SSID mgmt::proberesp cb wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART wlan0: STA 60:a1:0a:c7:af:01 WPA: sending 1/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0) IEEE 802.1X: 60:a1:0a:c7:af:01 TX status - version=2 type=3 length=95 - ack=1 wlan0: STA 60:a1:0a:c7:af:01 WPA: EAPOL-Key timeout WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state PTKSTART WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state DISCONNECT hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 60:a1:0a:c7:af:01 reason 2 WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state DISCONNECTED WPA: 60:a1:0a:c7:af:01 WPA_PTK entering state INITIALIZE wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x1438150 key_idx=0 set_tx=1 seq_len=0 key_len=0 addr=60:a1:0a:c7:af:01 wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.1X: unauthorizing port wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: deauthenticated due to local deauth request nl80211: Event message available nl80211: Ignored unknown event (cmd=20) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) STA 60:a1:0a:c7:af:01 sent probe request for broadcast SSID mgmt::proberesp cb unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) Signal 2 received - terminating Flushing old station entries Deauthenticate all stations nl80211: Remove interface ifindex=6 netlink: Operstate: linkmode=0, operstate=6
interface=wlan0 driver=nl80211 ssid=zootest channel=1 bridge=br0
May 7 15:19:07 zooty hostapd: wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authenticated May 7 15:19:07 zooty hostapd: wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: associated (aid 1) May 7 15:19:07 zooty hostapd: wlan0: STA 60:a1:0a:c7:af:01 RADIUS: starting accounting session 4DC599F5-0000001B May 7 15:19:17 zooty hostapd: wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authenticated May 7 15:19:17 zooty hostapd: wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: associated (aid 1) May 7 15:19:17 zooty hostapd: wlan0: STA 60:a1:0a:c7:af:01 RADIUS: starting accounting session 4DC599F5-0000001C May 7 15:19:26 zooty hostapd: wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authenticated May 7 15:19:26 zooty hostapd: wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: associated (aid 1) May 7 15:19:26 zooty hostapd: wlan0: STA 60:a1:0a:c7:af:01 RADIUS: starting accounting session 4DC599F5-0000001D
STA 60:a1:0a:c7:af:01 sent probe request for our SSID mgmt::proberesp cb mgmt::auth authentication: STA=60:a1:0a:c7:af:01 auth_alg=0 auth_transaction=1 status_code=0 wep=0 wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authentication OK (open system) wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-AUTHENTICATE.indication(60:a1:0a:c7:af:01, OPEN_SYSTEM) wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-DELETEKEYS.request(60:a1:0a:c7:af:01) authentication reply: STA=60:a1:0a:c7:af:01 auth_alg=0 auth_transaction=2 resp=0 (IE len=0) mgmt::auth cb wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: authenticated mgmt::assoc_req association request: STA=60:a1:0a:c7:af:01 capab_info=0x21 listen_interval=10 unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9) old AID 1 wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: association OK (aid 1) mgmt::assoc_resp cb wlan0: STA 60:a1:0a:c7:af:01 IEEE 802.11: associated (aid 1) AP-STA-CONNECTED 60:a1:0a:c7:af:01 wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-ASSOCIATE.indication(60:a1:0a:c7:af:01) wlan0: STA 60:a1:0a:c7:af:01 MLME: MLME-DELETEKEYS.request(60:a1:0a:c7:af:01) wlan0: STA 60:a1:0a:c7:af:01 RADIUS: starting accounting session 4DC599F5-0000001D nl80211: Event message available nl80211: Ignored unknown event (cmd=20) nl80211: Event message available nl80211: Ignored unknown event (cmd=19) STA 78:e4:00:11:96:fd sent probe request for broadcast SSID