Output of lspci: 00:00.0 Host bridge: Intel Corporation 2nd Generation Core Processor Family DRAM Controller (rev 09) Subsystem: ASUSTeK Computer Inc. Device 1277 Flags: bus master, fast devsel, latency 0 Capabilities: [e0] Vendor Specific Information: Len=0c Kernel driver in use: agpgart-intel 00:01.0 PCI bridge: Intel Corporation Xeon E3-1200/2nd Generation Core Processor Family PCI Express Root Port (rev 09) (prog-if 00 [Normal decode]) Flags: bus master, fast devsel, latency 0 Bus: primary=00, secondary=01, subordinate=01, sec-latency=0 I/O behind bridge: 0000d000-0000dfff Memory behind bridge: db000000-dc0fffff Prefetchable memory behind bridge: 00000000c0000000-00000000d1ffffff Capabilities: [88] Subsystem: ASUSTeK Computer Inc. Device 1277 Capabilities: [80] Power Management version 3 Capabilities: [90] MSI: Enable+ Count=1/1 Maskable- 64bit- Capabilities: [a0] Express Root Port (Slot+), MSI 00 Capabilities: [100] Virtual Channel Capabilities: [140] Root Complex Link Kernel driver in use: pcieport 00:02.0 VGA compatible controller: Intel Corporation 2nd Generation Core Processor Family Integrated Graphics Controller (rev 09) (prog-if 00 [VGA controller]) Subsystem: ASUSTeK Computer Inc. Device 15f2 Flags: bus master, fast devsel, latency 0, IRQ 51 Memory at dc400000 (64-bit, non-prefetchable) [size=4M] Memory at b0000000 (64-bit, prefetchable) [size=256M] I/O ports at e000 [size=64] Expansion ROM at [disabled] Capabilities: [90] MSI: Enable+ Count=1/1 Maskable- 64bit- Capabilities: [d0] Power Management version 2 Capabilities: [a4] PCI Advanced Features Kernel driver in use: i915 00:16.0 Communication controller: Intel Corporation 6 Series/C200 Series Chipset Family MEI Controller #1 (rev 04) Subsystem: ASUSTeK Computer Inc. Device 1277 Flags: bus master, fast devsel, latency 0, IRQ 47 Memory at df00a000 (64-bit, non-prefetchable) [size=16] Capabilities: [50] Power Management version 3 Capabilities: [8c] MSI: Enable+ Count=1/1 Maskable- 64bit+ Kernel driver in use: mei 00:1a.0 USB controller: Intel Corporation 6 Series/C200 Series Chipset Family USB Enhanced Host Controller #2 (rev 05) (prog-if 20 [EHCI]) Subsystem: ASUSTeK Computer Inc. Device 1277 Flags: bus master, medium devsel, latency 0, IRQ 16 Memory at df008000 (32-bit, non-prefetchable) [size=1K] Capabilities: [50] Power Management version 2 Capabilities: [58] Debug port: BAR=1 offset=00a0 Capabilities: [98] PCI Advanced Features Kernel driver in use: ehci_hcd 00:1b.0 Audio device: Intel Corporation 6 Series/C200 Series Chipset Family High Definition Audio Controller (rev 05) Subsystem: ASUSTeK Computer Inc. Device 1ac3 Flags: bus master, fast devsel, latency 0, IRQ 49 Memory at df000000 (64-bit, non-prefetchable) [size=16K] Capabilities: [50] Power Management version 2 Capabilities: [60] MSI: Enable+ Count=1/1 Maskable- 64bit+ Capabilities: [70] Express Root Complex Integrated Endpoint, MSI 00 Capabilities: [100] Virtual Channel Capabilities: [130] Root Complex Link Kernel driver in use: snd_hda_intel 00:1c.0 PCI bridge: Intel Corporation 6 Series/C200 Series Chipset Family PCI Express Root Port 1 (rev b5) (prog-if 00 [Normal decode]) Flags: bus master, fast devsel, latency 0 Bus: primary=00, secondary=02, subordinate=02, sec-latency=0 I/O behind bridge: 0000c000-0000cfff Memory behind bridge: de600000-deffffff Prefetchable memory behind bridge: 00000000d4200000-00000000d4bfffff Capabilities: [40] Express Root Port (Slot+), MSI 00 Capabilities: [80] MSI: Enable- Count=1/1 Maskable- 64bit- Capabilities: [90] Subsystem: ASUSTeK Computer Inc. Device 1277 Capabilities: [a0] Power Management version 2 Kernel driver in use: pcieport 00:1c.1 PCI bridge: Intel Corporation 6 Series/C200 Series Chipset Family PCI Express Root Port 2 (rev b5) (prog-if 00 [Normal decode]) Flags: bus master, fast devsel, latency 0 Bus: primary=00, secondary=03, subordinate=03, sec-latency=0 I/O behind bridge: 0000b000-0000bfff Memory behind bridge: ddc00000-de5fffff Prefetchable memory behind bridge: 00000000d3700000-00000000d40fffff Capabilities: [40] Express Root Port (Slot+), MSI 00 Capabilities: [80] MSI: Enable- Count=1/1 Maskable- 64bit- Capabilities: [90] Subsystem: ASUSTeK Computer Inc. Device 1277 Capabilities: [a0] Power Management version 2 Kernel driver in use: pcieport 00:1c.3 PCI bridge: Intel Corporation 6 Series/C200 Series Chipset Family PCI Express Root Port 4 (rev b5) (prog-if 00 [Normal decode]) Flags: bus master, fast devsel, latency 0 Bus: primary=00, secondary=04, subordinate=04, sec-latency=0 I/O behind bridge: 0000a000-0000afff Memory behind bridge: dd200000-ddbfffff Prefetchable memory behind bridge: 00000000d2c00000-00000000d35fffff Capabilities: [40] Express Root Port (Slot+), MSI 00 Capabilities: [80] MSI: Enable- Count=1/1 Maskable- 64bit- Capabilities: [90] Subsystem: ASUSTeK Computer Inc. Device 1277 Capabilities: [a0] Power Management version 2 Kernel driver in use: pcieport 00:1c.5 PCI bridge: Intel Corporation 6 Series/C200 Series Chipset Family PCI Express Root Port 6 (rev b5) (prog-if 00 [Normal decode]) Flags: bus master, fast devsel, latency 0 Bus: primary=00, secondary=05, subordinate=05, sec-latency=0 I/O behind bridge: 00009000-00009fff Memory behind bridge: dc800000-dd1fffff Prefetchable memory behind bridge: 00000000d2100000-00000000d2afffff Capabilities: [40] Express Root Port (Slot+), MSI 00 Capabilities: [80] MSI: Enable- Count=1/1 Maskable- 64bit- Capabilities: [90] Subsystem: ASUSTeK Computer Inc. Device 1277 Capabilities: [a0] Power Management version 2 Kernel driver in use: pcieport 00:1d.0 USB controller: Intel Corporation 6 Series/C200 Series Chipset Family USB Enhanced Host Controller #1 (rev 05) (prog-if 20 [EHCI]) Subsystem: ASUSTeK Computer Inc. Device 1277 Flags: bus master, medium devsel, latency 0, IRQ 23 Memory at df007000 (32-bit, non-prefetchable) [size=1K] Capabilities: [50] Power Management version 2 Capabilities: [58] Debug port: BAR=1 offset=00a0 Capabilities: [98] PCI Advanced Features Kernel driver in use: ehci_hcd 00:1f.0 ISA bridge: Intel Corporation HM65 Express Chipset Family LPC Controller (rev 05) Subsystem: ASUSTeK Computer Inc. Device 1277 Flags: bus master, medium devsel, latency 0 Capabilities: [e0] Vendor Specific Information: Len=0c 00:1f.2 SATA controller: Intel Corporation 6 Series/C200 Series Chipset Family 6 port SATA AHCI Controller (rev 05) (prog-if 01 [AHCI 1.0]) Subsystem: ASUSTeK Computer Inc. Device 1277 Flags: bus master, 66MHz, medium devsel, latency 0, IRQ 46 I/O ports at e0b0 [size=8] I/O ports at e0a0 [size=4] I/O ports at e090 [size=8] I/O ports at e080 [size=4] I/O ports at e060 [size=32] Memory at df006000 (32-bit, non-prefetchable) [size=2K] Capabilities: [80] MSI: Enable+ Count=1/1 Maskable- 64bit- Capabilities: [70] Power Management version 3 Capabilities: [a8] SATA HBA v1.0 Capabilities: [b0] PCI Advanced Features Kernel driver in use: ahci 00:1f.3 SMBus: Intel Corporation 6 Series/C200 Series Chipset Family SMBus Controller (rev 05) Subsystem: ASUSTeK Computer Inc. Device 1277 Flags: medium devsel, IRQ 18 Memory at df005000 (64-bit, non-prefetchable) [size=256] I/O ports at e040 [size=32] 01:00.0 VGA compatible controller: NVIDIA Corporation GF108 [GeForce GT 540M] (rev a1) (prog-if 00 [VGA controller]) Subsystem: ASUSTeK Computer Inc. Device 15f2 Flags: fast devsel, IRQ 10 Memory at db000000 (32-bit, non-prefetchable) [disabled] [size=16M] Memory at c0000000 (64-bit, prefetchable) [disabled] [size=256M] Memory at d0000000 (64-bit, prefetchable) [disabled] [size=32M] I/O ports at d000 [disabled] [size=128] Expansion ROM at dc000000 [disabled] [size=512K] Capabilities: [60] Power Management version 3 Capabilities: [68] MSI: Enable- Count=1/1 Maskable- 64bit+ Capabilities: [78] Express Endpoint, MSI 00 Capabilities: [b4] Vendor Specific Information: Len=14 Capabilities: [100] Virtual Channel Capabilities: [128] Power Budgeting Capabilities: [600] Vendor Specific Information: ID=0001 Rev=1 Len=024 03:00.0 Network controller: Intel Corporation Centrino Wireless-N 1030 (rev 34) Subsystem: Intel Corporation Centrino Wireless-N 1030 BGN Flags: bus master, fast devsel, latency 0, IRQ 50 Memory at ddc00000 (64-bit, non-prefetchable) [size=8K] Capabilities: [c8] Power Management version 3 Capabilities: [d0] MSI: Enable+ Count=1/1 Maskable- 64bit+ Capabilities: [e0] Express Endpoint, MSI 00 Capabilities: [100] Advanced Error Reporting Capabilities: [140] Device Serial Number ac-72-89-ff-ff-69-66-da Kernel driver in use: iwlwifi 04:00.0 USB controller: ASMedia Technology Inc. ASM1042 SuperSpeed USB Host Controller (prog-if 30 [XHCI]) Subsystem: ASUSTeK Computer Inc. Device 1059 Flags: bus master, fast devsel, latency 0, IRQ 19 Memory at dd200000 (64-bit, non-prefetchable) [size=32K] Capabilities: [50] MSI: Enable- Count=1/8 Maskable- 64bit+ Capabilities: [68] MSI-X: Enable+ Count=8 Masked- Capabilities: [78] Power Management version 3 Capabilities: [80] Express Legacy Endpoint, MSI 00 Capabilities: [100] Virtual Channel Kernel driver in use: xhci_hcd 05:00.0 Ethernet controller: Realtek Semiconductor Co., Ltd. RTL8111/8168B PCI Express Gigabit Ethernet controller (rev 06) Subsystem: ASUSTeK Computer Inc. Device 1277 Flags: bus master, fast devsel, latency 0, IRQ 48 I/O ports at 9000 [size=256] Memory at d2104000 (64-bit, prefetchable) [size=4K] Memory at d2100000 (64-bit, prefetchable) [size=16K] Capabilities: [40] Power Management version 3 Capabilities: [50] MSI: Enable+ Count=1/1 Maskable- 64bit+ Capabilities: [70] Express Endpoint, MSI 01 Capabilities: [b0] MSI-X: Enable- Count=4 Masked- Capabilities: [d0] Vital Product Data Capabilities: [100] Advanced Error Reporting Capabilities: [140] Virtual Channel Capabilities: [160] Device Serial Number 01-00-00-00-68-4c-e0-00 Kernel driver in use: r8169 Output of iwconfig: wlan0 IEEE 802.11bgn ESSID:off/any Mode:Managed Frequency:2.437 GHz Access Point: Not-Associated Tx-Power=0 dBm Retry long limit:7 RTS thr:off Fragment thr:off Encryption key:off Power Management:off Logged message in kernel.log: Jun 17 07:47:00 localhost kernel: [ 396.561501] wlan0: authenticate with 00:13:f7:74:da:2c Jun 17 07:47:00 localhost kernel: [ 396.570208] wlan0: send auth to 00:13:f7:74:da:2c (try 1/3) Jun 17 07:47:00 localhost kernel: [ 396.594461] wlan0: authenticated Jun 17 07:47:00 localhost kernel: [ 396.597507] wlan0: associate with 00:13:f7:74:da:2c (try 1/3) Jun 17 07:47:00 localhost kernel: [ 396.615885] wlan0: RX AssocResp from 00:13:f7:74:da:2c (capab=0x431 status=0 aid=8) Jun 17 07:47:00 localhost kernel: [ 396.615892] wlan0: associated Jun 17 07:47:22 localhost kernel: [ 419.102707] wlan0: deauthenticated from 00:13:f7:74:da:2c (Reason: 1) Jun 17 07:47:22 localhost kernel: [ 419.128802] cfg80211: Calling CRDA to update world regulatory domain Jun 17 07:47:33 localhost kernel: [ 430.201047] wlan0: authenticate with 00:13:f7:74:da:2c Jun 17 07:47:33 localhost kernel: [ 430.210269] wlan0: direct probe to 00:13:f7:74:da:2c (try 1/3) Jun 17 07:47:33 localhost kernel: [ 430.410464] wlan0: direct probe to 00:13:f7:74:da:2c (try 2/3) Jun 17 07:47:34 localhost kernel: [ 430.613496] wlan0: direct probe to 00:13:f7:74:da:2c (try 3/3) Jun 17 07:47:34 localhost kernel: [ 430.816640] wlan0: authentication with 00:13:f7:74:da:2c timed out Jun 17 07:47:34 localhost kernel: [ 430.821246] iwlwifi 0000:03:00.0: ACTIVATE a non DRIVER active station id 0 addr 00:13:f7:74:da:2c Jun 17 07:47:44 localhost kernel: [ 440.527849] wlan0: authenticate with 00:13:f7:74:da:2c Jun 17 07:47:44 localhost kernel: [ 440.537342] wlan0: direct probe to 00:13:f7:74:da:2c (try 1/3) Jun 17 07:47:44 localhost kernel: [ 440.738477] wlan0: direct probe to 00:13:f7:74:da:2c (try 2/3) Jun 17 07:47:44 localhost kernel: [ 440.941494] wlan0: direct probe to 00:13:f7:74:da:2c (try 3/3) Jun 17 07:47:44 localhost kernel: [ 441.144526] wlan0: authentication with 00:13:f7:74:da:2c timed out Jun 17 07:47:44 localhost kernel: [ 441.145598] iwlwifi 0000:03:00.0: ACTIVATE a non DRIVER active station id 0 addr 00:13:f7:74:da:2c Output of wpa_supplicant -d: 07:46:54 up 6 min, 1 user, load average: 0.04, 0.23, 0.16 Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' Reading configuration file '/etc/wpa_supplicant.conf' ctrl_interface='DIR=/var/run/wpa_supplicant GROUP=wheel' Priority group 0 id=0 ssid='DNS' WEXT: cfg80211-based driver detected SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf capabilities: key_mgmt 0xf enc 0xf flags 0x0 netlink: Operstate: linkmode=1, operstate=5 Own MAC address: ac:72:89:69:66:da wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_countermeasures RSN: flushing PMKID list in the driver Setting scan request: 0 sec 100000 usec WPS: UUID based on MAC address - hexdump(len=16): eb c3 62 2c 23 e4 54 52 95 ce 43 33 42 f7 2c d4 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized Using existing control interface directory. ctrl_interface_group=10 (from group name 'wheel') ctrl_iface bind(PF_UNIX) failed: Address already in use ctrl_iface exists, but does not allow connections - assuming it was leftover from forced program termination Successfully replaced leftover ctrl_iface socket '/var/run/wpa_supplicant/wlan0' Added interface wlan0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=16 Received 685 bytes of scan results (2 BSSes) BSS: Start scan result update 1 BSS: Add new id 0 BSSID 00:24:01:90:0c:b4 SSID 'Nela' BSS: Add new id 1 BSSID 00:21:27:d3:ea:d6 SSID 'PERPETRATORI' New scan results available Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:24:01:90:0c:b4 ssid='Nela' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 1: 00:21:27:d3:ea:d6 ssid='PERPETRATORI' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - no WPA/RSN IE Try to find non-WPA AP 0: 00:24:01:90:0c:b4 ssid='Nela' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 1: 00:21:27:d3:ea:d6 ssid='PERPETRATORI' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - SSID mismatch No suitable network found Setting scan request: 5 sec 0 usec EAPOL: disable timer tick EAPOL: Supplicant port status: Unauthorized State: DISCONNECTED -> SCANNING Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=16 Received 2563 bytes of scan results (6 BSSes) BSS: Start scan result update 2 BSS: Add new id 2 BSSID 00:13:f7:74:da:2c SSID 'DNS' BSS: Add new id 3 BSSID 00:02:72:80:04:ea SSID 'MyWLAN' BSS: Add new id 4 BSSID 94:44:52:7c:f0:2a SSID 'Belkin_Mareckovi' BSS: Add new id 5 BSSID 00:1e:8c:64:7a:2c SSID 'Merhautova72' New scan results available Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:13:f7:74:da:2c ssid='DNS' wpa_ie_len=26 rsn_ie_len=20 caps=0x11 selected based on RSN IE selected WPA AP 00:13:f7:74:da:2c ssid='DNS' Trying to associate with 00:13:f7:74:da:2c (SSID='DNS' freq=2437 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 16 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 01 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=19 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=32 AssocResp IE wireless event - hexdump(len=16): 01 08 82 84 8b 96 0c 18 30 48 32 04 12 24 60 6c RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 00:13:f7:74:da:2c Association info event resp_ies - hexdump(len=16): 01 08 82 84 8b 96 0c 18 30 48 32 04 12 24 60 6c State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:13:f7:74:da:2c No keys have been configured - skip key clearing Associated with 00:13:f7:74:da:2c WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) RX EAPOL from 00:13:f7:74:da:2c Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=117 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 0f a4 key_nonce - hexdump(len=32): eb 70 67 f3 e4 f8 9b 44 d6 3c 83 48 8d d6 20 96 2c 6a 18 16 b4 07 66 58 f2 04 f4 09 93 d7 6a a4 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:13:f7:74:da:2c (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 1c 9c a8 90 59 4d a3 f5 05 5a 19 65 b8 be 96 ca WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 1c 9c a8 90 59 4d a3 f5 05 5a 19 65 b8 be 96 ca RSN: PMKID from Authenticator - hexdump(len=16): 1c 9c a8 90 59 4d a3 f5 05 5a 19 65 b8 be 96 ca RSN: no matching PMKID found WPA: Renewed SNonce - hexdump(len=32): d6 9e 62 e4 6e 72 af 8b 24 1f be 5c a3 68 12 b2 51 06 07 80 cd 44 55 23 b3 2b 71 7e 36 9e c1 0b WPA: PTK derivation - A1=ac:72:89:69:66:da A2=00:13:f7:74:da:2c WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 RX EAPOL from 00:13:f7:74:da:2c IEEE 802.1X RX: version=1 type=3 length=167 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=72 replay_counter - hexdump(len=8): 00 00 00 00 00 00 0f a5 key_nonce - hexdump(len=32): eb 70 67 f3 e4 f8 9b 44 d6 3c 83 48 8d d6 20 96 2c 6a 18 16 b4 07 66 58 f2 04 f4 09 93 d7 6a a4 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 35 0e bd b5 57 7f fa 6e a4 ba 93 0b ea 3c d6 46 RSN: encrypted key data - hexdump(len=72): e0 fd 42 2d 8e bd 47 08 4b cb 01 1a 96 f4 6a 64 49 34 8b 00 34 71 40 09 74 26 d3 1a b8 b3 e2 57 55 cd 7e 08 8e 0f f7 ae 40 06 a9 0d c0 2c 39 57 95 9b 1e 29 d4 5d 26 14 54 b6 e9 bd 61 fb 3a de 29 f6 29 14 11 51 17 07 WPA: decrypted EAPOL-Key key data - hexdump(len=64): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:13:f7:74:da:2c (ver=2) WPA: IE KeyData - hexdump(len=64): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 01 00 dd 26 00 0f ac 01 03 00 d8 5b 2f cf 5a 73 78 c7 46 f9 f9 ca f8 e8 42 c5 9d e9 2d f5 c1 db 6e a7 98 4d 8d 9f f5 52 fb 4e dd 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 01 00 WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED] WPA: Sending EAPOL-Key 4/4 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=3 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=3 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with 00:13:f7:74:da:2c [PTK=CCMP GTK=TKIP] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:13:f7:74:da:2c completed (auth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) netlink: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RX EAPOL from 00:13:f7:74:da:2c IEEE 802.1X RX: version=1 type=3 length=167 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=72 replay_counter - hexdump(len=8): 00 00 00 00 00 00 0f a6 key_nonce - hexdump(len=32): eb 70 67 f3 e4 f8 9b 44 d6 3c 83 48 8d d6 20 96 2c 6a 18 16 b4 07 66 58 f2 04 f4 09 93 d7 6a a4 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 81 98 49 29 35 9a c4 bd 6c c5 b1 43 7e 8d b6 a7 RSN: encrypted key data - hexdump(len=72): e0 fd 42 2d 8e bd 47 08 4b cb 01 1a 96 f4 6a 64 49 34 8b 00 34 71 40 09 74 26 d3 1a b8 b3 e2 57 55 cd 7e 08 8e 0f f7 ae 40 06 a9 0d c0 2c 39 57 95 9b 1e 29 d4 5d 26 14 54 b6 e9 bd 61 fb 3a de 29 f6 29 14 11 51 17 07 WPA: decrypted EAPOL-Key key data - hexdump(len=64): [REMOVED] State: COMPLETED -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:13:f7:74:da:2c (ver=2) WPA: IE KeyData - hexdump(len=64): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 01 00 dd 26 00 0f ac 01 03 00 d8 5b 2f cf 5a 73 78 c7 46 f9 f9 ca f8 e8 42 c5 9d e9 2d f5 c1 db 6e a7 98 4d 8d 9f f5 52 fb 4e dd 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 01 00 WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED] WPA: Sending EAPOL-Key 4/4 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=3 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=3 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with 00:13:f7:74:da:2c [PTK=CCMP GTK=TKIP] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETED EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAP: EAP entering state DISABLED RX EAPOL from 00:13:f7:74:da:2c IEEE 802.1X RX: version=1 type=3 length=167 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=72 replay_counter - hexdump(len=8): 00 00 00 00 00 00 0f a7 key_nonce - hexdump(len=32): eb 70 67 f3 e4 f8 9b 44 d6 3c 83 48 8d d6 20 96 2c 6a 18 16 b4 07 66 58 f2 04 f4 09 93 d7 6a a4 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): ae 66 5e cc dd e5 73 7b 9c ec 9b 68 d7 46 21 2f RSN: encrypted key data - hexdump(len=72): e0 fd 42 2d 8e bd 47 08 4b cb 01 1a 96 f4 6a 64 49 34 8b 00 34 71 40 09 74 26 d3 1a b8 b3 e2 57 55 cd 7e 08 8e 0f f7 ae 40 06 a9 0d c0 2c 39 57 95 9b 1e 29 d4 5d 26 14 54 b6 e9 bd 61 fb 3a de 29 f6 29 14 11 51 17 07 WPA: decrypted EAPOL-Key key data - hexdump(len=64): [REMOVED] State: COMPLETED -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:13:f7:74:da:2c (ver=2) WPA: IE KeyData - hexdump(len=64): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 01 00 dd 26 00 0f ac 01 03 00 d8 5b 2f cf 5a 73 78 c7 46 f9 f9 ca f8 e8 42 c5 9d e9 2d f5 c1 db 6e a7 98 4d 8d 9f f5 52 fb 4e dd 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 01 00 WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED] WPA: Sending EAPOL-Key 4/4 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=3 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=3 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with 00:13:f7:74:da:2c [PTK=CCMP GTK=TKIP] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETED EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAP: EAP entering state DISABLED RX EAPOL from 00:13:f7:74:da:2c IEEE 802.1X RX: version=1 type=3 length=167 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=72 replay_counter - hexdump(len=8): 00 00 00 00 00 00 0f a8 key_nonce - hexdump(len=32): eb 70 67 f3 e4 f8 9b 44 d6 3c 83 48 8d d6 20 96 2c 6a 18 16 b4 07 66 58 f2 04 f4 09 93 d7 6a a4 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 78 4d db 3e 87 39 cb 7d eb b5 8d 17 02 9f 05 1f RSN: encrypted key data - hexdump(len=72): e0 fd 42 2d 8e bd 47 08 4b cb 01 1a 96 f4 6a 64 49 34 8b 00 34 71 40 09 74 26 d3 1a b8 b3 e2 57 55 cd 7e 08 8e 0f f7 ae 40 06 a9 0d c0 2c 39 57 95 9b 1e 29 d4 5d 26 14 54 b6 e9 bd 61 fb 3a de 29 f6 29 14 11 51 17 07 WPA: decrypted EAPOL-Key key data - hexdump(len=64): [REMOVED] State: COMPLETED -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:13:f7:74:da:2c (ver=2) WPA: IE KeyData - hexdump(len=64): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 01 00 dd 26 00 0f ac 01 03 00 d8 5b 2f cf 5a 73 78 c7 46 f9 f9 ca f8 e8 42 c5 9d e9 2d f5 c1 db 6e a7 98 4d 8d 9f f5 52 fb 4e dd 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 01 00 WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED] WPA: Sending EAPOL-Key 4/4 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=3 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=3 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with 00:13:f7:74:da:2c [PTK=CCMP GTK=TKIP] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETED EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAP: EAP entering state DISABLED RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 00:00:00:00:00:00 Disassociation notification Setting scan request: 0 sec 100000 usec Added BSSID 00:13:f7:74:da:2c into blacklist CTRL-EVENT-DISCONNECTED bssid=00:13:f7:74:da:2c reason=0 Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state INITIALIZE EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized State: DISCONNECTED -> SCANNING Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 30 seconds EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=16 Received 1054 bytes of scan results (3 BSSes) BSS: Start scan result update 3 New scan results available Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:02:72:80:04:ea ssid='MyWLAN' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 1: 00:1e:8c:64:7a:2c ssid='Merhautova72' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - no WPA/RSN IE 2: 00:21:27:d3:ea:d6 ssid='PERPETRATORI' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - no WPA/RSN IE Try to find non-WPA AP 0: 00:02:72:80:04:ea ssid='MyWLAN' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 1: 00:1e:8c:64:7a:2c ssid='Merhautova72' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:21:27:d3:ea:d6 ssid='PERPETRATORI' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - SSID mismatch No APs found - clear blacklist and try again Removed BSSID 00:13:f7:74:da:2c from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:02:72:80:04:ea ssid='MyWLAN' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 1: 00:1e:8c:64:7a:2c ssid='Merhautova72' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - no WPA/RSN IE 2: 00:21:27:d3:ea:d6 ssid='PERPETRATORI' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - no WPA/RSN IE Try to find non-WPA AP 0: 00:02:72:80:04:ea ssid='MyWLAN' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 1: 00:1e:8c:64:7a:2c ssid='Merhautova72' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:21:27:d3:ea:d6 ssid='PERPETRATORI' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - SSID mismatch No suitable network found Setting scan request: 5 sec 0 usec EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=16 Received 1536 bytes of scan results (4 BSSes) BSS: Start scan result update 4 BSS: Add new id 6 BSSID 40:4a:03:58:87:86 SSID 'KlidekNetUPC' BSS: Expire BSS 2 due to no match in scan BSS: Remove id 2 BSSID 00:13:f7:74:da:2c SSID 'DNS' BSS: Expire BSS 0 due to no match in scan BSS: Remove id 0 BSSID 00:24:01:90:0c:b4 SSID 'Nela' BSS: Expire BSS 4 due to no match in scan BSS: Remove id 4 BSSID 94:44:52:7c:f0:2a SSID 'Belkin_Mareckovi' New scan results available Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:02:72:80:04:ea ssid='MyWLAN' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 1: 40:4a:03:58:87:86 ssid='KlidekNetUPC' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - no WPA/RSN IE 2: 00:1e:8c:64:7a:2c ssid='Merhautova72' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - no WPA/RSN IE 3: 00:21:27:d3:ea:d6 ssid='PERPETRATORI' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - no WPA/RSN IE Try to find non-WPA AP 0: 00:02:72:80:04:ea ssid='MyWLAN' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 1: 40:4a:03:58:87:86 ssid='KlidekNetUPC' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1e:8c:64:7a:2c ssid='Merhautova72' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 3: 00:21:27:d3:ea:d6 ssid='PERPETRATORI' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - SSID mismatch No suitable network found Setting scan request: 5 sec 0 usec EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: Supplicant port status: Unauthorized Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=16 Received 2538 bytes of scan results (6 BSSes) BSS: Start scan result update 5 BSS: Add new id 7 BSSID 00:13:f7:74:da:2c SSID 'DNS' BSS: Add new id 8 BSSID 40:4a:03:03:3b:ea SSID 'aja' New scan results available Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:13:f7:74:da:2c ssid='DNS' wpa_ie_len=26 rsn_ie_len=20 caps=0x11 selected based on RSN IE selected WPA AP 00:13:f7:74:da:2c ssid='DNS' Trying to associate with 00:13:f7:74:da:2c (SSID='DNS' freq=2437 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 16 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 01 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=19 Authentication with 00:13:f7:74:da:2c timed out. Added BSSID 00:13:f7:74:da:2c into blacklist No keys have been configured - skip key clearing State: ASSOCIATING -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=16 Received 2846 bytes of scan results (6 BSSes) BSS: Start scan result update 6 BSS: Add new id 9 BSSID 94:44:52:7c:f0:2a SSID 'Belkin_Mareckovi' New scan results available Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:13:f7:74:da:2c ssid='DNS' wpa_ie_len=26 rsn_ie_len=20 caps=0x11 selected based on RSN IE selected WPA AP 00:13:f7:74:da:2c ssid='DNS' Trying to associate with 00:13:f7:74:da:2c (SSID='DNS' freq=2437 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 16 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 01 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd