Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unable to connect to hotspot #65

Open
TobiasDax opened this issue Nov 2, 2023 · 5 comments
Open

Unable to connect to hotspot #65

TobiasDax opened this issue Nov 2, 2023 · 5 comments

Comments

@TobiasDax
Copy link

TobiasDax commented Nov 2, 2023

Tried running this on a raspberry pi 4 and at first it seemed to work but i am unable to connect to the Hotspot with my Android Phone or windows PC

i tried to run it with the default settings given in the readme but nothing would connect, then i saw the --hs20 flg and ran that.
At first it looked like the same no connection error, but then the whole tool crashed

Here is the complete output

~/linux-router $ sudo ./lnxrouter --ap wlan0 MyAccessPoint -p MyPassPhrase --hs20
WARN: brmfmac driver doesn't work properly with virtual interfaces and
      it can cause kernel panic. For this reason we disallow virtual
      interfaces for your adapter.
      For more info: https://github.com/oblique/create_ap/issues/203
WARN: Your adapter does not fully support AP virtual interface, enabling --no-virt
linux-router 0.7.1b (https://github.com/garywill/linux-router)
Released under LGPL, with no warranty. Use on your own risk.

PID: 18716
Target interface is wlan0 (dc:a6:32:53:c0:26)
Use random LAN IPv4 address 192.168.63.1
Channel not specified, use default
Set wlan0 unmanaged by NetworkManager

haveged_watchdog PID: 18825

Starting hostapd
hostapd PID: 18831
wlan0: interface state UNINITIALIZED->ENABLED
wlan0: AP-ENABLED

iptables v1.8.9 (nf_tables)
NOTICE: Not showing all operations done to iptables rules

iptables: NAT
MASQUERADE  all opt -- in * out !wlan0  192.168.63.0/24 !-> 192.168.63.0/24   /* lrt18716wlan0 */
ACCEPT  all opt -- in wlan0 out *  192.168.63.0/24  -> 0.0.0.0/0   /* lrt18716wlan0 */
ACCEPT  all opt -- in * out wlan0  0.0.0.0/0  -> 192.168.63.0/24   /* lrt18716wlan0 */
Loaded kernel module nf_nat_pptp

iptables: allow DNS
ACCEPT  tcp opt -- in wlan0 out *  192.168.63.0/24  -> 192.168.63.1   tcp dpt:53 /* lrt18716wlan0 */
ACCEPT  udp opt -- in wlan0 out *  192.168.63.0/24  -> 192.168.63.1   udp dpt:53 /* lrt18716wlan0 */

iptables: allow dhcp
ACCEPT  udp opt -- in wlan0 out *  0.0.0.0/0  -> 0.0.0.0/0   udp dpt:67 /* lrt18716wlan0 */

Starting dnsmasq
Nov  2 22:09:24 dnsmasq[18867]: started, version 2.89 cachesize 150
Nov  2 22:09:24 dnsmasq[18867]: compile time options: IPv6 GNU-getopt DBus no-UBus i18n IDN2 DHCP DHCPv6 no-Lua TFTP conntrack ipset nftset auth cryptohash DNSSEC loop-detect inotify dumpfile
Nov  2 22:09:24 dnsmasq-dhcp[18867]: DHCP, IP range 192.168.63.10 -- 192.168.63.250, lease time 1h
Nov  2 22:09:24 dnsmasq-dhcp[18867]: DHCP, sockets bound exclusively to interface wlan0
Nov  2 22:09:24 dnsmasq[18867]: reading /etc/resolv.conf
Nov  2 22:09:24 dnsmasq[18867]: using nameserver 127.0.0.1#53
Nov  2 22:09:24 dnsmasq[18867]: cleared cache
dnsmasq PID: 18867

== Setting up completed, now linux-router should be working ==
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session 87379B80C8056720
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
Nov  2 22:10:01 dnsmasq-dhcp[18867]: DHCPDISCOVER(wlan0) 6e:0d:e3:c2:48:9b
Nov  2 22:10:01 dnsmasq-dhcp[18867]: DHCPOFFER(wlan0) 192.168.63.109 6e:0d:e3:c2:48:9b
Nov  2 22:10:01 dnsmasq-dhcp[18867]: DHCPDISCOVER(wlan0) 6e:0d:e3:c2:48:9b
Nov  2 22:10:01 dnsmasq-dhcp[18867]: DHCPOFFER(wlan0) 192.168.63.109 6e:0d:e3:c2:48:9b
Nov  2 22:10:01 dnsmasq-dhcp[18867]: DHCPDISCOVER(wlan0) 6e:0d:e3:c2:48:9b
Nov  2 22:10:01 dnsmasq-dhcp[18867]: DHCPOFFER(wlan0) 192.168.63.109 6e:0d:e3:c2:48:9b
Nov  2 22:10:01 dnsmasq-dhcp[18867]: DHCPREQUEST(wlan0) 192.168.63.109 6e:0d:e3:c2:48:9b
Nov  2 22:10:01 dnsmasq-dhcp[18867]: DHCPACK(wlan0) 192.168.63.109 6e:0d:e3:c2:48:9b Pixel-6a
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session 03D4083AA987A829
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
Nov  2 22:10:12 dnsmasq-dhcp[18867]: DHCPREQUEST(wlan0) 192.168.63.109 6e:0d:e3:c2:48:9b
Nov  2 22:10:12 dnsmasq-dhcp[18867]: DHCPACK(wlan0) 192.168.63.109 6e:0d:e3:c2:48:9b Pixel-6a
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
Error occured

ERROR: hostapd failed

./lnxrouter: line 1: 18831 Segmentation fault      $STDBUF_PATH hostapd $HOSTAPD_DEBUG_ARGS -P "$CONFDIR/hostapd.pid" "$CONFDIR/hostapd.conf"
Error occured


Doing cleanup..
Nov  2 22:10:22 dnsmasq[18867]: exiting on receipt of SIGTERM
Killed dnsmasq.pid 18867 dnsmasq
Terminated
Killed haveged_watchdog.pid 18825 lnxrouter
Failed to kill hostapd.pid 18831 , it may have exited
Terminated
Killed keep_running.pid 18896 bash
Undoing iptables changes ..
Error occured

ERROR: dnsmasq failed

If i run it with -w 1 i get

~/linux-router $ sudo ./lnxrouter --ap wlan0 MyAccessPoint -p MyPassPhrase -w 1
WARN: brmfmac driver doesn't work properly with virtual interfaces and
      it can cause kernel panic. For this reason we disallow virtual
      interfaces for your adapter.
      For more info: https://github.com/oblique/create_ap/issues/203
WARN: Your adapter does not fully support AP virtual interface, enabling --no-virt
linux-router 0.7.1b (https://github.com/garywill/linux-router)
Released under LGPL, with no warranty. Use on your own risk.

PID: 5013
Target interface is wlan0 (dc:a6:32:53:c0:26)
Use random LAN IPv4 address 192.168.13.1
Channel not specified, use default
Set wlan0 unmanaged by NetworkManager

haveged_watchdog PID: 5120

Starting hostapd
hostapd PID: 5125
wlan0: interface state UNINITIALIZED->ENABLED
wlan0: AP-ENABLED

iptables v1.8.9 (nf_tables)
NOTICE: Not showing all operations done to iptables rules

iptables: NAT
MASQUERADE  all opt -- in * out !wlan0  192.168.13.0/24 !-> 192.168.13.0/24   /* lrt5013wlan0 */
ACCEPT  all opt -- in wlan0 out *  192.168.13.0/24  -> 0.0.0.0/0   /* lrt5013wlan0 */
ACCEPT  all opt -- in * out wlan0  0.0.0.0/0  -> 192.168.13.0/24   /* lrt5013wlan0 */
Loaded kernel module nf_nat_pptp

iptables: allow DNS
ACCEPT  tcp opt -- in wlan0 out *  192.168.13.0/24  -> 192.168.13.1   tcp dpt:53 /* lrt5013wlan0 */
ACCEPT  udp opt -- in wlan0 out *  192.168.13.0/24  -> 192.168.13.1   udp dpt:53 /* lrt5013wlan0 */

iptables: allow dhcp
ACCEPT  udp opt -- in wlan0 out *  0.0.0.0/0  -> 0.0.0.0/0   udp dpt:67 /* lrt5013wlan0 */

Starting dnsmasq
Nov  2 22:15:13 dnsmasq[5162]: started, version 2.89 cachesize 150
Nov  2 22:15:13 dnsmasq[5162]: compile time options: IPv6 GNU-getopt DBus no-UBus i18n IDN2 DHCP DHCPv6 no-Lua TFTP conntrack ipset nftset auth cryptohash DNSSEC loop-detect inotify dumpfile
Nov  2 22:15:13 dnsmasq-dhcp[5162]: DHCP, IP range 192.168.13.10 -- 192.168.13.250, lease time 1h
Nov  2 22:15:13 dnsmasq-dhcp[5162]: DHCP, sockets bound exclusively to interface wlan0
Nov  2 22:15:13 dnsmasq[5162]: reading /etc/resolv.conf
Nov  2 22:15:13 dnsmasq[5162]: using nameserver 127.0.0.1#53
Nov  2 22:15:13 dnsmasq[5162]: cleared cache
dnsmasq PID: 5162

== Setting up completed, now linux-router should be working ==
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated

and with -w 2 i get the same as the default (obvoiusly) but my phone tries to auto connect a few times more

~/linux-router $ sudo ./lnxrouter --ap wlan0 MyAccessPoint -p MyPassPhrase -w 2
WARN: brmfmac driver doesn't work properly with virtual interfaces and
      it can cause kernel panic. For this reason we disallow virtual
      interfaces for your adapter.
      For more info: https://github.com/oblique/create_ap/issues/203
WARN: Your adapter does not fully support AP virtual interface, enabling --no-virt
linux-router 0.7.1b (https://github.com/garywill/linux-router)
Released under LGPL, with no warranty. Use on your own risk.

PID: 6092
Target interface is wlan0 (dc:a6:32:53:c0:26)
Use random LAN IPv4 address 192.168.239.1
Channel not specified, use default
Set wlan0 unmanaged by NetworkManager

haveged_watchdog PID: 6199

Starting hostapd
hostapd PID: 6204
wlan0: interface state UNINITIALIZED->ENABLED
wlan0: AP-ENABLED

iptables v1.8.9 (nf_tables)
NOTICE: Not showing all operations done to iptables rules

iptables: NAT
MASQUERADE  all opt -- in * out !wlan0  192.168.239.0/24 !-> 192.168.239.0/24   /* lrt6092wlan0 */
ACCEPT  all opt -- in wlan0 out *  192.168.239.0/24  -> 0.0.0.0/0   /* lrt6092wlan0 */
ACCEPT  all opt -- in * out wlan0  0.0.0.0/0  -> 192.168.239.0/24   /* lrt6092wlan0 */
Loaded kernel module nf_nat_pptp

iptables: allow DNS
ACCEPT  tcp opt -- in wlan0 out *  192.168.239.0/24  -> 192.168.239.1   tcp dpt:53 /* lrt6092wlan0 */
ACCEPT  udp opt -- in wlan0 out *  192.168.239.0/24  -> 192.168.239.1   udp dpt:53 /* lrt6092wlan0 */

iptables: allow dhcp
ACCEPT  udp opt -- in wlan0 out *  0.0.0.0/0  -> 0.0.0.0/0   udp dpt:67 /* lrt6092wlan0 */

Starting dnsmasq
Nov  2 22:17:29 dnsmasq[6241]: started, version 2.89 cachesize 150
Nov  2 22:17:29 dnsmasq[6241]: compile time options: IPv6 GNU-getopt DBus no-UBus i18n IDN2 DHCP DHCPv6 no-Lua TFTP conntrack ipset nftset auth cryptohash DNSSEC loop-detect inotify dumpfile
Nov  2 22:17:29 dnsmasq-dhcp[6241]: DHCP, IP range 192.168.239.10 -- 192.168.239.250, lease time 1h
Nov  2 22:17:29 dnsmasq-dhcp[6241]: DHCP, sockets bound exclusively to interface wlan0
Nov  2 22:17:29 dnsmasq[6241]: reading /etc/resolv.conf
Nov  2 22:17:29 dnsmasq[6241]: using nameserver 127.0.0.1#53
Nov  2 22:17:29 dnsmasq[6241]: cleared cache
dnsmasq PID: 6241

== Setting up completed, now linux-router should be working ==
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session CA43925BA12E8E04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
Nov  2 22:17:38 dnsmasq-dhcp[6241]: DHCPDISCOVER(wlan0) 6e:0d:e3:c2:48:9b
Nov  2 22:17:38 dnsmasq-dhcp[6241]: DHCPOFFER(wlan0) 192.168.239.109 6e:0d:e3:c2:48:9b
Nov  2 22:17:38 dnsmasq-dhcp[6241]: DHCPDISCOVER(wlan0) 6e:0d:e3:c2:48:9b
Nov  2 22:17:38 dnsmasq-dhcp[6241]: DHCPOFFER(wlan0) 192.168.239.109 6e:0d:e3:c2:48:9b
Nov  2 22:17:38 dnsmasq-dhcp[6241]: DHCPDISCOVER(wlan0) 6e:0d:e3:c2:48:9b
Nov  2 22:17:38 dnsmasq-dhcp[6241]: DHCPOFFER(wlan0) 192.168.239.109 6e:0d:e3:c2:48:9b
Nov  2 22:17:38 dnsmasq-dhcp[6241]: DHCPREQUEST(wlan0) 192.168.239.109 6e:0d:e3:c2:48:9b
Nov  2 22:17:38 dnsmasq-dhcp[6241]: DHCPACK(wlan0) 192.168.239.109 6e:0d:e3:c2:48:9b Pixel-6a
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session 473B6417CC625EE0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
Nov  2 22:17:49 dnsmasq-dhcp[6241]: DHCPREQUEST(wlan0) 192.168.239.109 6e:0d:e3:c2:48:9b
Nov  2 22:17:49 dnsmasq-dhcp[6241]: DHCPACK(wlan0) 192.168.239.109 6e:0d:e3:c2:48:9b Pixel-6a
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
@garywill
Copy link
Owner

garywill commented Nov 3, 2023

Usually use default options. --hs20 is not needed.
Your phone doesn't work with -w 1 apparently. -w 2 seems ok. Just use it without -w, use default.

For now I can't tell which is going wrong, try add --hostapd-debug 1 ( or 2). Let's see if the debug log can tell us something

@TobiasDax
Copy link
Author

Yeah, i started with the default options and just tried other stuff when those did not work.

tried again with --hostapd-debug-1

~/linux-router $ sudo ./lnxrouter --ap wlan0 MyAccessPoint -p MyPassPhrase --hostapd-debug 1
WARN: brmfmac driver doesn't work properly with virtual interfaces and
      it can cause kernel panic. For this reason we disallow virtual
      interfaces for your adapter.
      For more info: https://github.com/oblique/create_ap/issues/203
WARN: Your adapter does not fully support AP virtual interface, enabling --no-virt
linux-router 0.7.1b (https://github.com/garywill/linux-router)
Released under LGPL, with no warranty. Use on your own risk.

PID: 79906
Target interface is wlan0 (dc:a6:32:53:c0:26)
Use random LAN IPv4 address 192.168.112.1
Channel not specified, use default
Set wlan0 unmanaged by NetworkManager

haveged_watchdog PID: 80014

Starting hostapd
hostapd PID: 80020
random: getrandom() support available
Configuration file: /dev/shm/lnxrouter_tmp/lnxrouter.wlan0.conf.Kt34RC/hostapd.conf
ctrl_interface_group=0
nl80211: Using driver-based roaming
nl80211: TDLS supported
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:6
nl80211: Using driver-based off-channel TX
nl80211: Supported vendor command: vendor_id=0x1018 subcmd=1
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: Enable multi-channel concurrent (driver advertised support)
nl80211: use P2P_DEVICE support
nl80211: key_mgmt=0xd0f enc=0x10f auth=0x7 flags=0x2000000380cfacc rrm_flags=0x0 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=10
nl80211: interface wlan0 in phy phy0
nl80211: Set mode ifindex 3 iftype 3 (AP)
nl80211: Setup AP(wlan0) - device_ap_sme=1 use_monitor=0
nl80211: Subscribe to mgmt frames with AP handle 0x559f6efb60 (device SME)
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=04 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=0501 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=0503 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=0504 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=06 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=08 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=09 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=0a multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=11 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=12 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=7f multicast=0
nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x559f6efb60 match= multicast=0
nl80211: Enable Probe Request reporting nl_preq=0x559f6f4830
nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x559f6f4830 match= multicast=0
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
nl80211: Add own interface ifindex 3 (ifidx_reason -1)
nl80211: if_indices[16]: 3(-1)
phy: phy0
BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
nl80211: Regulatory information - country=DE (DFS-ETSI)
nl80211: 2400-2483 @ 40 MHz 20 mBm
nl80211: 5150-5250 @ 80 MHz 23 mBm (no outdoor)
nl80211: 5250-5350 @ 80 MHz 20 mBm (no outdoor) (DFS)
nl80211: 5470-5725 @ 160 MHz 26 mBm (DFS)
nl80211: 5725-5875 @ 80 MHz 13 mBm
nl80211: 5945-6425 @ 160 MHz 23 mBm (no outdoor)
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 2484[DISABLED]
nl80211: Mode IEEE 802.11a: 5170 5180 5190 5200 5210 5220 5230 5240 5260[RADAR] 5280[RADAR] 5300[RADAR] 5320[RADAR] 5500[RADAR] 5520[RADAR] 5540[RADAR] 5560[RADAR] 5580[RADAR] 5600[RADAR] 5620[RADAR] 5640[RADAR] 5660[RADAR]
nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 2484[DISABLED]
Completing interface initialization
Mode: IEEE 802.11g  Channel: 1  Frequency: 2412 MHz
hostapd_handle_dfs_offload: iface->cac_started: 0
hostapd_handle_dfs_offload: freq 2412 MHz does not require DFS. Continue channel/AP setup
Proceed with AP/channel setup
nl80211: Set freq 2412 (ht_enabled=0, vht_enabled=0, he_enabled=0, bandwidth=20 MHz, cf1=2412 MHz, cf2=0 MHz)
  * freq=2412
  * he_enabled=0
  * vht_enabled=0
  * ht_enabled=0
  * channel_type=0
RATE[0] rate=10 flags=0x1
RATE[1] rate=20 flags=0x1
RATE[2] rate=55 flags=0x1
RATE[3] rate=110 flags=0x1
RATE[4] rate=60 flags=0x0
RATE[5] rate=90 flags=0x0
RATE[6] rate=120 flags=0x0
RATE[7] rate=180 flags=0x0
RATE[8] rate=240 flags=0x0
RATE[9] rate=360 flags=0x0
RATE[10] rate=480 flags=0x0
RATE[11] rate=540 flags=0x0
hostapd_setup_bss(hapd=0x559f6f0a10 (wlan0), first=1)
nl80211: flush -> DEL_STATION wlan0 (all)
nl80211: Station flush failed: ret=-14 (Bad address)
Using interface wlan0 with hwaddr dc:a6:32:53:c0:26 and ssid "MyAccessPoint"
Deriving WPA PSK based on passphrase
SSID - hexdump_ascii(len=13):
     4d 79 41 63 63 65 73 73 50 6f 69 6e 74            MyAccessPoint
PSK (ASCII passphrase) - hexdump_ascii(len=12): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
random: Got 20/20 random bytes
GMK - hexdump(len=32): [REMOVED]
Key Counter - hexdump(len=32): [REMOVED]
WPA: Delay group state machine start until Beacon frames have been configured
nl80211: Set beacon (beacon_set=0)
nl80211: Beacon head - hexdump(len=64): 80 00 00 00 ff ff ff ff ff ff dc a6 32 53 c0 26 dc a6 32 53 c0 26 00 00 00 00 00 00 00 00 00 00 64 00 11 04 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 0c 12 18 24 03 01 01
nl80211: Beacon tail - hexdump(len=37): 2a 01 04 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 7f 04 00 00 00 02
nl80211: ifindex=3
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=MyAccessPoint
  * beacon_int=100
  * dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x3
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x2
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl80211: beacon_ies - hexdump(len=6): 7f 04 00 00 00 02
nl80211: proberesp_ies - hexdump(len=6): 7f 04 00 00 00 02
nl80211: assocresp_ies - hexdump(len=6): 7f 04 00 00 00 02
wlan0: Deauthenticate all stations at BSS start
nl80211: sta_remove -> DEL_STATION wlan0 ff:ff:ff:ff:ff:ff --> 0 (Success)
WPA: Start group state machine to set initial keys
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x55755b4b78 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set wlan0 operstate 0->1 (UP)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=-95
Failed to set TX queue parameters for queue 0.
nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=-95
Failed to set TX queue parameters for queue 1.
nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=-95
Failed to set TX queue parameters for queue 2.
nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=-95
Failed to set TX queue parameters for queue 3.
wlan0: interface state UNINITIALIZED->ENABLED
wlan0: AP-ENABLED
wlan0: Setup of interface done.
ctrl_iface not configured!
RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
VLAN: RTM_NEWLINK: ifi_index=3 ifname=wlan0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
VLAN: vlan_newlink(wlan0)
VLAN: RTM_NEWLINK: ifi_index=3 ifname=wlan0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
VLAN: vlan_newlink(wlan0)

iptables v1.8.9 (nf_tables)
NOTICE: Not showing all operations done to iptables rules

iptables: NAT
MASQUERADE  all opt -- in * out !wlan0  192.168.112.0/24 !-> 192.168.112.0/24   /* lrt79906wlan0 */
ACCEPT  all opt -- in wlan0 out *  192.168.112.0/24  -> 0.0.0.0/0   /* lrt79906wlan0 */
ACCEPT  all opt -- in * out wlan0  0.0.0.0/0  -> 192.168.112.0/24   /* lrt79906wlan0 */
Loaded kernel module nf_nat_pptp

iptables: allow DNS
ACCEPT  tcp opt -- in wlan0 out *  192.168.112.0/24  -> 192.168.112.1   tcp dpt:53 /* lrt79906wlan0 */
ACCEPT  udp opt -- in wlan0 out *  192.168.112.0/24  -> 192.168.112.1   udp dpt:53 /* lrt79906wlan0 */

iptables: allow dhcp
ACCEPT  udp opt -- in wlan0 out *  0.0.0.0/0  -> 0.0.0.0/0   udp dpt:67 /* lrt79906wlan0 */

Starting dnsmasq
Nov  3 09:17:48 dnsmasq[80056]: started, version 2.89 cachesize 150
Nov  3 09:17:48 dnsmasq[80056]: compile time options: IPv6 GNU-getopt DBus no-UBus i18n IDN2 DHCP DHCPv6 no-Lua TFTP conntrack ipset nftset auth cryptohash DNSSEC loop-detect inotify dumpfile
Nov  3 09:17:48 dnsmasq-dhcp[80056]: DHCP, IP range 192.168.112.10 -- 192.168.112.250, lease time 1h
Nov  3 09:17:48 dnsmasq-dhcp[80056]: DHCP, sockets bound exclusively to interface wlan0
Nov  3 09:17:48 dnsmasq[80056]: reading /etc/resolv.conf
Nov  3 09:17:48 dnsmasq[80056]: using nameserver 127.0.0.1#53
Nov  3 09:17:48 dnsmasq[80056]: cleared cache
dnsmasq PID: 80056

== Setting up completed, now linux-router should be working ==
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71e6c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71e6c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Re-initialize GMK/Counter on first station
GMK - hexdump(len=32): [REMOVED]
Key Counter - hexdump(len=32): [REMOVED]
GTK - hexdump(len=16): [REMOVED]
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x55755b4b78 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
WPA: Assign ANonce - hexdump(len=32): c1 c9 0e 1d 54 d0 99 b9 5f 3b 3e 6a 7e cd 18 86 a8 49 75 dd 9a 52 de b3 9d 76 30 f6 78 fd 14 36
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): c1 c9 0e 1d 54 d0 99 b9 5f 3b 3e 6a 7e cd 18 86 a8 49 75 dd 9a 52 de b3 9d 76 30 f6 78 fd 14 36
WPA: Nonce2 - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=0x559f6f59e0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: invalid MIC in msg 2/4 of 4-Way Handshake
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b WPA: EAPOL-Key timeout
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): c1 c9 0e 1d 54 d0 99 b9 5f 3b 3e 6a 7e cd 18 86 a8 49 75 dd 9a 52 de b3 9d 76 30 f6 78 fd 14 36
WPA: Nonce2 - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=0x559f6f59e0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: invalid MIC in msg 2/4 of 4-Way Handshake
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: EAPOL-Key timeout
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 3)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): c1 c9 0e 1d 54 d0 99 b9 5f 3b 3e 6a 7e cd 18 86 a8 49 75 dd 9a 52 de b3 9d 76 30 f6 78 fd 14 36
WPA: Nonce2 - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=0x559f6f59e0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: invalid MIC in msg 2/4 of 4-Way Handshake
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: EAPOL-Key timeout
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 4)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): c1 c9 0e 1d 54 d0 99 b9 5f 3b 3e 6a 7e cd 18 86 a8 49 75 dd 9a 52 de b3 9d 76 30 f6 78 fd 14 36
WPA: Nonce2 - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=0x559f6f59e0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: invalid MIC in msg 2/4 of 4-Way Handshake
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: EAPOL-Key timeout
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: PTKSTART: Retry limit 4 reached
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECT
wpa_sta_disconnect STA 6e:0d:e3:c2:48:9b (reason 15)
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 6e:0d:e3:c2:48:9b reason 15
wlan0: ap_sta_disconnect addr 6e:0d:e3:c2:48:9b reason=15
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 3 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71e6c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
wlan0: ap_sta_disconnect: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (5 seconds - AP_MAX_INACTIVITY_AFTER_DEAUTH)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71e6c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71e6c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71e6c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b
wlan0: Removed ap_sta_deauth_cb_timeout timeout for 6e:0d:e3:c2:48:9b
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
Disassociation notification for unknown STA 6e:0d:e3:c2:48:9b
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71ec10 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71ec10 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): dc 71 e2 59 2a 18 eb 77 ca 05 36 6c c0 0a 2d d8 33 f1 2d 6e b6 98 5b d6 60 95 7f 62 f5 de ef 1b
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 2c 0c a7 34 c3 62 50 3a 8b 4f e9 0d ae 5b 3c ea 2c 6a 84 8d dc cf 1a 1b ee d5 ee 6f 8f 57 b0 7f
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): dc 71 e2 59 2a 18 eb 77 ca 05 36 6c c0 0a 2d d8 33 f1 2d 6e b6 98 5b d6 60 95 7f 62 f5 de ef 1b
WPA: Nonce2 - hexdump(len=32): 2c 0c a7 34 c3 62 50 3a 8b 4f e9 0d ae 5b 3c ea 2c 6a 84 8d dc cf 1a 1b ee d5 ee 6f 8f 57 b0 7f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 99 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=95
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=0
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x559f71ec10 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   addr=6e:0d:e3:c2:48:9b
   pairwise key
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x61 flags_or=0x1 flags_and=0xffffffff authorized=1
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: authorizing port
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session 840ECAE5178C8D31
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
nl80211: RX frame da=dc:a6:32:53:c0:26 sa=6e:0d:e3:c2:48:9b bssid=dc:a6:32:53:c0:26 freq=2412 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=28
wlan0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 10 action 6 sa 6e:0d:e3:c2:48:9b da dc:a6:32:53:c0:26 len 28 freq 2412
Ignore BSS Transition Management Query from 6e:0d:e3:c2:48:9b since BSS Transition Management is disabled
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): d4 ec 5d ca 4e c2 a8 5e 14 30 26 bd 27 7a 77 80 6e 5c 75 b2 65 3b 56 b3 ed f1 c7 bc 30 96 93 e6
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): d4 ec 5d ca 4e c2 a8 5e 14 30 26 bd 27 7a 77 80 6e 5c 75 b2 65 3b 56 b3 ed f1 c7 bc 30 96 93 e6
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 04
Nov  3 09:18:54 dnsmasq-dhcp[80056]: DHCPDISCOVER(wlan0) 6e:0d:e3:c2:48:9b
Nov  3 09:18:54 dnsmasq-dhcp[80056]: DHCPOFFER(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b
Nov  3 09:18:54 dnsmasq-dhcp[80056]: DHCPDISCOVER(wlan0) 6e:0d:e3:c2:48:9b
Nov  3 09:18:54 dnsmasq-dhcp[80056]: DHCPOFFER(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b
Nov  3 09:18:54 dnsmasq-dhcp[80056]: DHCPREQUEST(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b
Nov  3 09:18:54 dnsmasq-dhcp[80056]: DHCPACK(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b Pixel-6a
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71ec10 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71ec10 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71efe0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71efe0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): ad 4c 3a a4 d2 24 b7 1e 02 c6 4c e7 0f 7e 3c 2d 64 aa ce b2 71 8c c6 75 1c b5 d3 92 71 83 04 65
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 09 76 ef e4 26 0c 88 dc eb 92 ec 47 d0 1a 87 b0 df 74 c0 33 d2 76 b4 fb b8 87 28 71 50 5e c2 4a
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): ad 4c 3a a4 d2 24 b7 1e 02 c6 4c e7 0f 7e 3c 2d 64 aa ce b2 71 8c c6 75 1c b5 d3 92 71 83 04 65
WPA: Nonce2 - hexdump(len=32): 09 76 ef e4 26 0c 88 dc eb 92 ec 47 d0 1a 87 b0 df 74 c0 33 d2 76 b4 fb b8 87 28 71 50 5e c2 4a
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 99 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=95
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=0
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x559f71efe0 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   addr=6e:0d:e3:c2:48:9b
   pairwise key
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x61 flags_or=0x1 flags_and=0xffffffff authorized=1
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: authorizing port
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session 4DC8C1A8212252F1
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
nl80211: RX frame da=dc:a6:32:53:c0:26 sa=6e:0d:e3:c2:48:9b bssid=dc:a6:32:53:c0:26 freq=2412 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=28
wlan0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 10 action 6 sa 6e:0d:e3:c2:48:9b da dc:a6:32:53:c0:26 len 28 freq 2412
Ignore BSS Transition Management Query from 6e:0d:e3:c2:48:9b since BSS Transition Management is disabled
Nov  3 09:18:58 dnsmasq-dhcp[80056]: DHCPREQUEST(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b
Nov  3 09:18:58 dnsmasq-dhcp[80056]: DHCPACK(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b Pixel-6a
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): b0 30 4e 02 c3 d7 88 19 ab 65 db 9e c9 b8 46 43 7a 84 91 be 48 3d ea 1e 63 7d cd 16 82 90 98 2a
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): b0 30 4e 02 c3 d7 88 19 ab 65 db 9e c9 b8 46 43 7a 84 91 be 48 3d ea 1e 63 7d cd 16 82 90 98 2a
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 04
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71efe0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71efe0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
Disassociation notification for unknown STA 6e:0d:e3:c2:48:9b
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71f550 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71f550 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): 44 60 8c fd e6 d3 4b 6e e6 49 78 33 83 a9 7f 1e 54 25 79 4a 75 dc 5c a6 92 9a a6 d3 59 d5 c1 2f
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): d2 9d a1 ee 78 2d 1d 6d 33 b3 3a ef 80 6a fd f8 76 33 b8 d9 6e fb 5e c0 e9 ca 8e cb 78 0f 53 a6
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): 44 60 8c fd e6 d3 4b 6e e6 49 78 33 83 a9 7f 1e 54 25 79 4a 75 dc 5c a6 92 9a a6 d3 59 d5 c1 2f
WPA: Nonce2 - hexdump(len=32): d2 9d a1 ee 78 2d 1d 6d 33 b3 3a ef 80 6a fd f8 76 33 b8 d9 6e fb 5e c0 e9 ca 8e cb 78 0f 53 a6
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 99 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=95
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=0
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x559f71f550 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   addr=6e:0d:e3:c2:48:9b
   pairwise key
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x61 flags_or=0x1 flags_and=0xffffffff authorized=1
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: authorizing port
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session ECFACD6B50F78A77
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
nl80211: RX frame da=dc:a6:32:53:c0:26 sa=6e:0d:e3:c2:48:9b bssid=dc:a6:32:53:c0:26 freq=2412 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=28
wlan0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 10 action 6 sa 6e:0d:e3:c2:48:9b da dc:a6:32:53:c0:26 len 28 freq 2412
Ignore BSS Transition Management Query from 6e:0d:e3:c2:48:9b since BSS Transition Management is disabled
Nov  3 09:19:03 dnsmasq-dhcp[80056]: DHCPREQUEST(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b
Nov  3 09:19:03 dnsmasq-dhcp[80056]: DHCPACK(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b Pixel-6a
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 12 ee 88 fa c3 2a d2 17 b7 52 0c 09 f1 63 c4 bf 6a 07 b0 79 c5 9b 4b ba 41 19 a2 57 d6 21 a2 6e
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 12 ee 88 fa c3 2a d2 17 b7 52 0c 09 f1 63 c4 bf 6a 07 b0 79 c5 9b 4b ba 41 19 a2 57 d6 21 a2 6e
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 04
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71f550 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71f550 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71f920 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71f920 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): 0d 8c 2e ad dd b5 c8 89 1c 82 81 10 23 64 d7 cc 92 a6 f2 ab be 06 98 2d 1e ea 69 2d cb 42 8a ab
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 59 80 7e 9f c1 5b 32 48 66 34 b7 f2 5c 8c c3 1e 89 b3 60 1f 66 79 50 eb 2c 30 b1 75 32 75 e6 f9
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): 0d 8c 2e ad dd b5 c8 89 1c 82 81 10 23 64 d7 cc 92 a6 f2 ab be 06 98 2d 1e ea 69 2d cb 42 8a ab
WPA: Nonce2 - hexdump(len=32): 59 80 7e 9f c1 5b 32 48 66 34 b7 f2 5c 8c c3 1e 89 b3 60 1f 66 79 50 eb 2c 30 b1 75 32 75 e6 f9
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 99 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=95
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=0
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x559f71f920 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   addr=6e:0d:e3:c2:48:9b
   pairwise key
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x61 flags_or=0x1 flags_and=0xffffffff authorized=1
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: authorizing port
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session 3F0E4FCBF7B5DD94
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
nl80211: RX frame da=dc:a6:32:53:c0:26 sa=6e:0d:e3:c2:48:9b bssid=dc:a6:32:53:c0:26 freq=2412 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=28
wlan0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 10 action 6 sa 6e:0d:e3:c2:48:9b da dc:a6:32:53:c0:26 len 28 freq 2412
Ignore BSS Transition Management Query from 6e:0d:e3:c2:48:9b since BSS Transition Management is disabled
Nov  3 09:19:10 dnsmasq-dhcp[80056]: DHCPREQUEST(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b
Nov  3 09:19:10 dnsmasq-dhcp[80056]: DHCPACK(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b Pixel-6a
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 03 9a 92 f7 3d 0d b7 72 78 03 57 fd 78 14 a1 2e a9 d8 91 d3 11 a5 fa 48 c5 98 c8 d3 d0 be cc b2
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 03 9a 92 f7 3d 0d b7 72 78 03 57 fd 78 14 a1 2e a9 d8 91 d3 11 a5 fa 48 c5 98 c8 d3 d0 be cc b2
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 04
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71f920 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71f920 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
Disassociation notification for unknown STA 6e:0d:e3:c2:48:9b
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71fc40 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71fc40 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): 0a 4a 4c af 5e a6 94 c5 26 49 61 33 8b a0 0c 80 34 44 05 b2 f4 ac dd 30 ad 75 dc 7a 0f f1 d3 19
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): c4 ac 87 0c 06 34 ee 1e 33 df c2 52 55 11 93 65 cc c5 d8 e9 c8 f0 35 0d 18 0f c3 8c ef 70 f9 ff
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): 0a 4a 4c af 5e a6 94 c5 26 49 61 33 8b a0 0c 80 34 44 05 b2 f4 ac dd 30 ad 75 dc 7a 0f f1 d3 19
WPA: Nonce2 - hexdump(len=32): c4 ac 87 0c 06 34 ee 1e 33 df c2 52 55 11 93 65 cc c5 d8 e9 c8 f0 35 0d 18 0f c3 8c ef 70 f9 ff
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 99 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=95
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=0
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x559f71fc40 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   addr=6e:0d:e3:c2:48:9b
   pairwise key
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x61 flags_or=0x1 flags_and=0xffffffff authorized=1
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: authorizing port
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session 3218587E5E72CA38
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
nl80211: RX frame da=dc:a6:32:53:c0:26 sa=6e:0d:e3:c2:48:9b bssid=dc:a6:32:53:c0:26 freq=2412 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=28
wlan0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 10 action 6 sa 6e:0d:e3:c2:48:9b da dc:a6:32:53:c0:26 len 28 freq 2412
Ignore BSS Transition Management Query from 6e:0d:e3:c2:48:9b since BSS Transition Management is disabled
Nov  3 09:19:14 dnsmasq-dhcp[80056]: DHCPREQUEST(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b
Nov  3 09:19:14 dnsmasq-dhcp[80056]: DHCPACK(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b Pixel-6a
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): de ef ae 9a f3 02 21 98 0e 6c 38 4f ea 1d c0 e4 90 df 1a f2 36 66 f9 3c cc 4f d1 66 f7 20 87 bf
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
nl80211: RX frame da=dc:a6:32:53:c0:26 sa=6e:0d:e3:c2:48:9b bssid=dc:a6:32:53:c0:26 freq=2412 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=35
wlan0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 10 action 26 sa 6e:0d:e3:c2:48:9b da dc:a6:32:53:c0:26 len 35 freq 2412
WNM: Received WNM Notification Request frame from 6e:0d:e3:c2:48:9b (dialog_token=19 type=221)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): de ef ae 9a f3 02 21 98 0e 6c 38 4f ea 1d c0 e4 90 df 1a f2 36 66 f9 3c cc 4f d1 66 f7 20 87 bf
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 04
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71fc40 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71fc40 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
Disassociation notification for unknown STA 6e:0d:e3:c2:48:9b
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71ff60 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71ff60 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): f9 5a 23 9c 1f 93 32 fe 89 cd b7 72 26 a3 82 9a a5 f6 63 35 1b 6b 67 4f 44 ec 73 16 9f 26 51 b7
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): ea f5 2d fe fc 26 34 a4 32 22 16 99 fe aa b8 77 a9 a1 a5 e1 da ec c5 ec 05 8a 0d 72 0b 66 8e 81
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): f9 5a 23 9c 1f 93 32 fe 89 cd b7 72 26 a3 82 9a a5 f6 63 35 1b 6b 67 4f 44 ec 73 16 9f 26 51 b7
WPA: Nonce2 - hexdump(len=32): ea f5 2d fe fc 26 34 a4 32 22 16 99 fe aa b8 77 a9 a1 a5 e1 da ec c5 ec 05 8a 0d 72 0b 66 8e 81
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 99 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=95
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=0
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x559f71ff60 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   addr=6e:0d:e3:c2:48:9b
   pairwise key
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x61 flags_or=0x1 flags_and=0xffffffff authorized=1
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: authorizing port
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session E82FD2FE6686785D
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
nl80211: RX frame da=dc:a6:32:53:c0:26 sa=6e:0d:e3:c2:48:9b bssid=dc:a6:32:53:c0:26 freq=2412 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=28
wlan0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 10 action 6 sa 6e:0d:e3:c2:48:9b da dc:a6:32:53:c0:26 len 28 freq 2412
Ignore BSS Transition Management Query from 6e:0d:e3:c2:48:9b since BSS Transition Management is disabled
Nov  3 09:19:22 dnsmasq-dhcp[80056]: DHCPREQUEST(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b
Nov  3 09:19:22 dnsmasq-dhcp[80056]: DHCPACK(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b Pixel-6a
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 32 fd d6 5b 1b 44 fc d6 f0 9c 93 43 84 05 f2 88 97 1c a8 da 51 79 74 71 85 b4 74 87 a3 71 0c e3
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 32 fd d6 5b 1b 44 fc d6 f0 9c 93 43 84 05 f2 88 97 1c a8 da 51 79 74 71 85 b4 74 87 a3 71 0c e3
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 04
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71ff60 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71ff60 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
Disassociation notification for unknown STA 6e:0d:e3:c2:48:9b
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): 92 0d 4a ce 96 f7 63 6a 70 9b 0e ff c9 c0 ac 66 f3 76 7d 84 b6 c2 75 57 cd 92 06 47 4c 29 21 62
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 21 aa 6c c0 1e b4 30 06 c5 04 c6 85 22 71 ea c9 e2 7c 80 43 a7 a9 41 ca 17 31 a3 6f cc 05 1e c6
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): 92 0d 4a ce 96 f7 63 6a 70 9b 0e ff c9 c0 ac 66 f3 76 7d 84 b6 c2 75 57 cd 92 06 47 4c 29 21 62
WPA: Nonce2 - hexdump(len=32): 21 aa 6c c0 1e b4 30 06 c5 04 c6 85 22 71 ea c9 e2 7c 80 43 a7 a9 41 ca 17 31 a3 6f cc 05 1e c6
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 99 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=95
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=0
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   addr=6e:0d:e3:c2:48:9b
   pairwise key
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x61 flags_or=0x1 flags_and=0xffffffff authorized=1
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: authorizing port
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session 7217086A6BE1F882
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
nl80211: RX frame da=dc:a6:32:53:c0:26 sa=6e:0d:e3:c2:48:9b bssid=dc:a6:32:53:c0:26 freq=2412 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=28
wlan0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 10 action 6 sa 6e:0d:e3:c2:48:9b da dc:a6:32:53:c0:26 len 28 freq 2412
Ignore BSS Transition Management Query from 6e:0d:e3:c2:48:9b since BSS Transition Management is disabled
Nov  3 09:19:26 dnsmasq-dhcp[80056]: DHCPREQUEST(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b
Nov  3 09:19:26 dnsmasq-dhcp[80056]: DHCPACK(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b Pixel-6a
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 6c 56 49 e9 86 0f 3c 45 00 bd 44 29 f7 bd 4e 90 77 64 36 bc 6e 56 6c 23 c6 7d 5f e0 d4 d3 a4 d5
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 6c 56 49 e9 86 0f 3c 45 00 bd 44 29 f7 bd 4e 90 77 64 36 bc 6e 56 6c 23 c6 7d 5f e0 d4 d3 a4 d5
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 04
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
Disassociation notification for unknown STA 6e:0d:e3:c2:48:9b
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): b0 7a db d1 93 56 f8 95 27 de 13 13 cf 28 bb 9d 81 37 de 24 a5 a5 c8 6d d9 d5 19 80 c8 52 29 76
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): ef 9b 42 e4 ab df b7 b3 67 0d 01 b2 fd e7 3b bd 5d e7 1d 99 50 2a 61 32 51 82 54 21 c0 dd cf 71
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): b0 7a db d1 93 56 f8 95 27 de 13 13 cf 28 bb 9d 81 37 de 24 a5 a5 c8 6d d9 d5 19 80 c8 52 29 76
WPA: Nonce2 - hexdump(len=32): ef 9b 42 e4 ab df b7 b3 67 0d 01 b2 fd e7 3b bd 5d e7 1d 99 50 2a 61 32 51 82 54 21 c0 dd cf 71
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=0x559f6f59e0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: invalid MIC in msg 2/4 of 4-Way Handshake
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b WPA: EAPOL-Key timeout
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): ef 9b 42 e4 ab df b7 b3 67 0d 01 b2 fd e7 3b bd 5d e7 1d 99 50 2a 61 32 51 82 54 21 c0 dd cf 71
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): b0 7a db d1 93 56 f8 95 27 de 13 13 cf 28 bb 9d 81 37 de 24 a5 a5 c8 6d d9 d5 19 80 c8 52 29 76
WPA: Nonce2 - hexdump(len=32): ef 9b 42 e4 ab df b7 b3 67 0d 01 b2 fd e7 3b bd 5d e7 1d 99 50 2a 61 32 51 82 54 21 c0 dd cf 71
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): ef 9b 42 e4 ab df b7 b3 67 0d 01 b2 fd e7 3b bd 5d e7 1d 99 50 2a 61 32 51 82 54 21 c0 dd cf 71
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
pending replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: EAPOL-Key timeout
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): ef 9b 42 e4 ab df b7 b3 67 0d 01 b2 fd e7 3b bd 5d e7 1d 99 50 2a 61 32 51 82 54 21 c0 dd cf 71
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: STA 6e:0d:e3:c2:48:9b WPA: EAPOL-Key timeout
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 05
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 3)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): ef 9b 42 e4 ab df b7 b3 67 0d 01 b2 fd e7 3b bd 5d e7 1d 99 50 2a 61 32 51 82 54 21 c0 dd cf 71
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
Disassociation notification for unknown STA 6e:0d:e3:c2:48:9b
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): 2c dd 93 23 0f ef 80 7a 26 6d 2a 82 b7 99 31 1f 8d 77 cc f7 41 91 4e 64 eb ab 78 03 64 fc eb fc
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 80 01 9a f2 84 5f 87 35 80 7d 71 ba f5 a8 3d 16 1a 38 38 a6 6a ef 87 9e 7f 6d 4f fe ac e8 da 9f
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): 2c dd 93 23 0f ef 80 7a 26 6d 2a 82 b7 99 31 1f 8d 77 cc f7 41 91 4e 64 eb ab 78 03 64 fc eb fc
WPA: Nonce2 - hexdump(len=32): 80 01 9a f2 84 5f 87 35 80 7d 71 ba f5 a8 3d 16 1a 38 38 a6 6a ef 87 9e 7f 6d 4f fe ac e8 da 9f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=0x559f6f59e0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: invalid MIC in msg 2/4 of 4-Way Handshake
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b WPA: EAPOL-Key timeout
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 80 01 9a f2 84 5f 87 35 80 7d 71 ba f5 a8 3d 16 1a 38 38 a6 6a ef 87 9e 7f 6d 4f fe ac e8 da 9f
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): 2c dd 93 23 0f ef 80 7a 26 6d 2a 82 b7 99 31 1f 8d 77 cc f7 41 91 4e 64 eb ab 78 03 64 fc eb fc
WPA: Nonce2 - hexdump(len=32): 80 01 9a f2 84 5f 87 35 80 7d 71 ba f5 a8 3d 16 1a 38 38 a6 6a ef 87 9e 7f 6d 4f fe ac e8 da 9f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 80 01 9a f2 84 5f 87 35 80 7d 71 ba f5 a8 3d 16 1a 38 38 a6 6a ef 87 9e 7f 6d 4f fe ac e8 da 9f
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
pending replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: EAPOL-Key timeout
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 80 01 9a f2 84 5f 87 35 80 7d 71 ba f5 a8 3d 16 1a 38 38 a6 6a ef 87 9e 7f 6d 4f fe ac e8 da 9f
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 80 01 9a f2 84 5f 87 35 80 7d 71 ba f5 a8 3d 16 1a 38 38 a6 6a ef 87 9e 7f 6d 4f fe ac e8 da 9f
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: STA 6e:0d:e3:c2:48:9b WPA: EAPOL-Key timeout
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 05
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 3)
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b

It stays connected for around a second, then tries to reconnect in a loop

tried again with --hostapd-debug 2 since i was already trying

~/linux-router $ sudo ./lnxrouter --ap wlan0 MyAccessPoint -p MyPassPhrase --hostapd-debug 2
WARN: brmfmac driver doesn't work properly with virtual interfaces and
      it can cause kernel panic. For this reason we disallow virtual
      interfaces for your adapter.
      For more info: https://github.com/oblique/create_ap/issues/203
WARN: Your adapter does not fully support AP virtual interface, enabling --no-virt
linux-router 0.7.1b (https://github.com/garywill/linux-router)
Released under LGPL, with no warranty. Use on your own risk.

PID: 81248
Target interface is wlan0 (dc:a6:32:53:c0:26)
Use random LAN IPv4 address 192.168.251.1
Channel not specified, use default
Set wlan0 unmanaged by NetworkManager

haveged_watchdog PID: 81355

Starting hostapd
hostapd PID: 81360
random: getrandom() support available
Configuration file: /dev/shm/lnxrouter_tmp/lnxrouter.wlan0.conf.NINnpo/hostapd.conf
ctrl_interface_group=0
nl80211: Using driver-based roaming
nl80211: TDLS supported
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:6
nl80211: Using driver-based off-channel TX
nl80211: Supported vendor command: vendor_id=0x1018 subcmd=1
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: Enable multi-channel concurrent (driver advertised support)
nl80211: use P2P_DEVICE support
nl80211: key_mgmt=0xd0f enc=0x10f auth=0x7 flags=0x2000000380cfacc rrm_flags=0x0 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=10
nl80211: interface wlan0 in phy phy0
nl80211: Set mode ifindex 3 iftype 3 (AP)
nl80211: Setup AP(wlan0) - device_ap_sme=1 use_monitor=0
nl80211: Subscribe to mgmt frames with AP handle 0x55765f8b60 (device SME)
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=04 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=0501 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=0503 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=0504 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=06 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=08 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=09 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=0a multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=11 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=12 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=7f multicast=0
nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x55765f8b60 match= multicast=0
nl80211: Enable Probe Request reporting nl_preq=0x55765fd830
nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x55765fd830 match= multicast=0
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
nl80211: Add own interface ifindex 3 (ifidx_reason -1)
nl80211: if_indices[16]: 3(-1)
phy: phy0
BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
nl80211: Regulatory information - country=DE (DFS-ETSI)
nl80211: 2400-2483 @ 40 MHz 20 mBm
nl80211: 5150-5250 @ 80 MHz 23 mBm (no outdoor)
nl80211: 5250-5350 @ 80 MHz 20 mBm (no outdoor) (DFS)
nl80211: 5470-5725 @ 160 MHz 26 mBm (DFS)
nl80211: 5725-5875 @ 80 MHz 13 mBm
nl80211: 5945-6425 @ 160 MHz 23 mBm (no outdoor)
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 2484[DISABLED]
nl80211: Mode IEEE 802.11a: 5170 5180 5190 5200 5210 5220 5230 5240 5260[RADAR] 5280[RADAR] 5300[RADAR] 5320[RADAR] 5500[RADAR] 5520[RADAR] 5540[RADAR] 5560[RADAR] 5580[RADAR] 5600[RADAR] 5620[RADAR] 5640[RADAR] 5660[RADAR]
nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 2484[DISABLED]
Allowed channel: mode=1 chan=1 freq=2412 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=2 freq=2417 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=3 freq=2422 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=4 freq=2427 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=5 freq=2432 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=6 freq=2437 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=7 freq=2442 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=8 freq=2447 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=9 freq=2452 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=10 freq=2457 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=11 freq=2462 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=12 freq=2467 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=13 freq=2472 MHz max_tx_power=20 dBm
Allowed channel: mode=2 chan=34 freq=5170 MHz max_tx_power=23 dBm
Allowed channel: mode=2 chan=36 freq=5180 MHz max_tx_power=23 dBm
Allowed channel: mode=2 chan=38 freq=5190 MHz max_tx_power=23 dBm
Allowed channel: mode=2 chan=40 freq=5200 MHz max_tx_power=23 dBm
Allowed channel: mode=2 chan=42 freq=5210 MHz max_tx_power=23 dBm
Allowed channel: mode=2 chan=44 freq=5220 MHz max_tx_power=23 dBm
Allowed channel: mode=2 chan=46 freq=5230 MHz max_tx_power=23 dBm
Allowed channel: mode=2 chan=48 freq=5240 MHz max_tx_power=23 dBm
Allowed channel: mode=2 chan=52 freq=5260 MHz max_tx_power=20 dBm
Allowed channel: mode=2 chan=56 freq=5280 MHz max_tx_power=20 dBm
Allowed channel: mode=2 chan=60 freq=5300 MHz max_tx_power=20 dBm
Allowed channel: mode=2 chan=64 freq=5320 MHz max_tx_power=20 dBm
Allowed channel: mode=2 chan=100 freq=5500 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=104 freq=5520 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=108 freq=5540 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=112 freq=5560 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=116 freq=5580 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=120 freq=5600 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=124 freq=5620 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=128 freq=5640 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=132 freq=5660 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=136 freq=5680 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=140 freq=5700 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=144 freq=5720 MHz max_tx_power=0 dBm
Allowed channel: mode=2 chan=149 freq=5745 MHz max_tx_power=13 dBm
Allowed channel: mode=2 chan=153 freq=5765 MHz max_tx_power=13 dBm
Allowed channel: mode=2 chan=157 freq=5785 MHz max_tx_power=13 dBm
Allowed channel: mode=2 chan=161 freq=5805 MHz max_tx_power=13 dBm
Allowed channel: mode=2 chan=165 freq=5825 MHz max_tx_power=13 dBm
Allowed channel: mode=0 chan=1 freq=2412 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=2 freq=2417 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=3 freq=2422 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=4 freq=2427 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=5 freq=2432 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=6 freq=2437 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=7 freq=2442 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=8 freq=2447 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=9 freq=2452 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=10 freq=2457 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=11 freq=2462 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=12 freq=2467 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=13 freq=2472 MHz max_tx_power=20 dBm
Completing interface initialization
Mode: IEEE 802.11g  Channel: 1  Frequency: 2412 MHz
hostapd_handle_dfs_offload: iface->cac_started: 0
hostapd_handle_dfs_offload: freq 2412 MHz does not require DFS. Continue channel/AP setup
Proceed with AP/channel setup
nl80211: Set freq 2412 (ht_enabled=0, vht_enabled=0, he_enabled=0, bandwidth=20 MHz, cf1=2412 MHz, cf2=0 MHz)
  * freq=2412
  * he_enabled=0
  * vht_enabled=0
  * ht_enabled=0
  * channel_type=0
RATE[0] rate=10 flags=0x1
RATE[1] rate=20 flags=0x1
RATE[2] rate=55 flags=0x1
RATE[3] rate=110 flags=0x1
RATE[4] rate=60 flags=0x0
RATE[5] rate=90 flags=0x0
RATE[6] rate=120 flags=0x0
RATE[7] rate=180 flags=0x0
RATE[8] rate=240 flags=0x0
RATE[9] rate=360 flags=0x0
RATE[10] rate=480 flags=0x0
RATE[11] rate=540 flags=0x0
hostapd_setup_bss(hapd=0x55765f9a10 (wlan0), first=1)
nl80211: flush -> DEL_STATION wlan0 (all)
nl80211: Station flush failed: ret=-14 (Bad address)
Using interface wlan0 with hwaddr dc:a6:32:53:c0:26 and ssid "MyAccessPoint"
Deriving WPA PSK based on passphrase
SSID - hexdump_ascii(len=13):
     4d 79 41 63 63 65 73 73 50 6f 69 6e 74            MyAccessPoint
PSK (ASCII passphrase) - hexdump_ascii(len=12): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
random: Got 20/20 random bytes
Get randomness: len=32 entropy=0
GMK - hexdump(len=32): [REMOVED]
Get randomness: len=32 entropy=0
Key Counter - hexdump(len=32): [REMOVED]
WPA: Delay group state machine start until Beacon frames have been configured
nl80211: Set beacon (beacon_set=0)
nl80211: Beacon head - hexdump(len=64): 80 00 00 00 ff ff ff ff ff ff dc a6 32 53 c0 26 dc a6 32 53 c0 26 00 00 00 00 00 00 00 00 00 00 64 00 11 04 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 0c 12 18 24 03 01 01
nl80211: Beacon tail - hexdump(len=37): 2a 01 04 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 7f 04 00 00 00 02
nl80211: ifindex=3
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=MyAccessPoint
  * beacon_int=100
  * dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x3
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x2
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl80211: beacon_ies - hexdump(len=6): 7f 04 00 00 00 02
nl80211: proberesp_ies - hexdump(len=6): 7f 04 00 00 00 02
nl80211: assocresp_ies - hexdump(len=6): 7f 04 00 00 00 02
wlan0: Deauthenticate all stations at BSS start
nl80211: sta_remove -> DEL_STATION wlan0 ff:ff:ff:ff:ff:ff --> 0 (Success)
WPA: Start group state machine to set initial keys
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
Get randomness: len=16 entropy=0
GTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x55654a4b78 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set wlan0 operstate 0->1 (UP)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=-95
Failed to set TX queue parameters for queue 0.
nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=-95
Failed to set TX queue parameters for queue 1.
nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=-95
Failed to set TX queue parameters for queue 2.
nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=-95
Failed to set TX queue parameters for queue 3.
wlan0: interface state UNINITIALIZED->ENABLED
wlan0: AP-ENABLED
wlan0: Setup of interface done.
ctrl_iface not configured!
RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
VLAN: RTM_NEWLINK: ifi_index=3 ifname=wlan0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
VLAN: vlan_newlink(wlan0)
VLAN: RTM_NEWLINK: ifi_index=3 ifname=wlan0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
VLAN: vlan_newlink(wlan0)

iptables v1.8.9 (nf_tables)
NOTICE: Not showing all operations done to iptables rules

iptables: NAT
MASQUERADE  all opt -- in * out !wlan0  192.168.251.0/24 !-> 192.168.251.0/24   /* lrt81248wlan0 */
ACCEPT  all opt -- in wlan0 out *  192.168.251.0/24  -> 0.0.0.0/0   /* lrt81248wlan0 */
ACCEPT  all opt -- in * out wlan0  0.0.0.0/0  -> 192.168.251.0/24   /* lrt81248wlan0 */
Loaded kernel module nf_nat_pptp

iptables: allow DNS
ACCEPT  tcp opt -- in wlan0 out *  192.168.251.0/24  -> 192.168.251.1   tcp dpt:53 /* lrt81248wlan0 */
ACCEPT  udp opt -- in wlan0 out *  192.168.251.0/24  -> 192.168.251.1   udp dpt:53 /* lrt81248wlan0 */

iptables: allow dhcp
ACCEPT  udp opt -- in wlan0 out *  0.0.0.0/0  -> 0.0.0.0/0   udp dpt:67 /* lrt81248wlan0 */

Starting dnsmasq
Nov  3 09:21:50 dnsmasq[81397]: started, version 2.89 cachesize 150
Nov  3 09:21:50 dnsmasq[81397]: compile time options: IPv6 GNU-getopt DBus no-UBus i18n IDN2 DHCP DHCPv6 no-Lua TFTP conntrack ipset nftset auth cryptohash DNSSEC loop-detect inotify dumpfile
Nov  3 09:21:50 dnsmasq-dhcp[81397]: DHCP, IP range 192.168.251.10 -- 192.168.251.250, lease time 1h
Nov  3 09:21:50 dnsmasq-dhcp[81397]: DHCP, sockets bound exclusively to interface wlan0
Nov  3 09:21:50 dnsmasq[81397]: reading /etc/resolv.conf
Nov  3 09:21:50 dnsmasq[81397]: using nameserver 127.0.0.1#53
Nov  3 09:21:50 dnsmasq[81397]: cleared cache
dnsmasq PID: 81397

== Setting up completed, now linux-router should be working ==
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55766276c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55766276c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Re-initialize GMK/Counter on first station
Get randomness: len=32 entropy=1
GMK - hexdump(len=32): [REMOVED]
Get randomness: len=32 entropy=0
Key Counter - hexdump(len=32): [REMOVED]
Get randomness: len=16 entropy=0
GTK - hexdump(len=16): [REMOVED]
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x55654a4b78 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
Get randomness: len=32 entropy=0
WPA: Assign ANonce - hexdump(len=32): f6 c2 f1 eb e1 c5 61 41 cd 9b a4 45 89 1f 84 5d 8e ee 80 3b e2 05 d2 87 35 5e d0 fc 76 c0 ea 2f
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: RX EAPOL data - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 59 3e 80 2a fe 3c 3c 28 75 92 f2 6a 5a 40 58 fa ec ba 2c 3e 76 41 b3 d5 24 c1 99 c3 04 95 dc 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d2 af a4 30 b3 fd b0 4e eb a9 20 6f df f8 3e 89 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: EAPOL-Key header (ending before Key MIC) - hexdump(len=77): 02 01 0a 00 00 00 00 00 00 00 00 00 01 59 3e 80 2a fe 3c 3c 28 75 92 f2 6a 5a 40 58 fa ec ba 2c 3e 76 41 b3 d5 24 c1 99 c3 04 95 dc 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: EAPOL-Key Key MIC - hexdump(len=16): d2 af a4 30 b3 fd b0 4e eb a9 20 6f df f8 3e 89
WPA: Received Key Nonce - hexdump(len=32): 59 3e 80 2a fe 3c 3c 28 75 92 f2 6a 5a 40 58 fa ec ba 2c 3e 76 41 b3 d5 24 c1 99 c3 04 95 dc 0c
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): f6 c2 f1 eb e1 c5 61 41 cd 9b a4 45 89 1f 84 5d 8e ee 80 3b e2 05 d2 87 35 5e d0 fc 76 c0 ea 2f
WPA: Nonce2 - hexdump(len=32): 59 3e 80 2a fe 3c 3c 28 75 92 f2 6a 5a 40 58 fa ec ba 2c 3e 76 41 b3 d5 24 c1 99 c3 04 95 dc 0c
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 99 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=95
WPA: RX EAPOL data - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 05 22 ab e4 51 8d e0 d9 e9 9a 47 c8 64 e5 9e 00 00
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=0
WPA: EAPOL-Key header (ending before Key MIC) - hexdump(len=77): 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: EAPOL-Key Key MIC - hexdump(len=16): 1a 05 22 ab e4 51 8d e0 d9 e9 9a 47 c8 64 e5 9e
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x55766276c0 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   addr=6e:0d:e3:c2:48:9b
   pairwise key
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x61 flags_or=0x1 flags_and=0xffffffff authorized=1
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: authorizing port
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session E60E6802E14B0CC6
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan0(dc:a6:32:53:c0:26) A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
nl80211: MLME event frame - hexdump(len=28): d0 00 00 00 dc a6 32 53 c0 26 6e 0d e3 c2 48 9b dc a6 32 53 c0 26 00 00 0a 06 16 06
nl80211: Frame event
nl80211: RX frame da=dc:a6:32:53:c0:26 sa=6e:0d:e3:c2:48:9b bssid=dc:a6:32:53:c0:26 freq=2412 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=28
wlan0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 10 action 6 sa 6e:0d:e3:c2:48:9b da dc:a6:32:53:c0:26 len 28 freq 2412
Ignore BSS Transition Management Query from 6e:0d:e3:c2:48:9b since BSS Transition Management is disabled
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: RX EAPOL data - hexdump(len=121): 01 03 00 75 02 03 0a 00 00 00 00 00 00 00 00 00 03 1c 84 a4 d4 a6 19 53 a7 6e 05 1b 5c ca c6 79 1e 61 c3 36 26 a4 3d 62 c0 65 3e 87 b1 70 48 cc 9a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5f a2 77 00 7f 8c 16 21 3d 13 31 ba 39 62 83 21 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: EAPOL-Key header (ending before Key MIC) - hexdump(len=77): 02 03 0a 00 00 00 00 00 00 00 00 00 03 1c 84 a4 d4 a6 19 53 a7 6e 05 1b 5c ca c6 79 1e 61 c3 36 26 a4 3d 62 c0 65 3e 87 b1 70 48 cc 9a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: EAPOL-Key Key MIC - hexdump(len=16): 5f a2 77 00 7f 8c 16 21 3d 13 31 ba 39 62 83 21
WPA: Received Key Nonce - hexdump(len=32): 1c 84 a4 d4 a6 19 53 a7 6e 05 1b 5c ca c6 79 1e 61 c3 36 26 a4 3d 62 c0 65 3e 87 b1 70 48 cc 9a
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: RX EAPOL data - hexdump(len=121): 01 03 00 75 02 03 0a 00 00 00 00 00 00 00 00 00 04 1c 84 a4 d4 a6 19 53 a7 6e 05 1b 5c ca c6 79 1e 61 c3 36 26 a4 3d 62 c0 65 3e 87 b1 70 48 cc 9a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6a 4c 52 78 e4 3e 75 9a b0 f7 e9 b3 9d cf ab 6d 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: EAPOL-Key header (ending before Key MIC) - hexdump(len=77): 02 03 0a 00 00 00 00 00 00 00 00 00 04 1c 84 a4 d4 a6 19 53 a7 6e 05 1b 5c ca c6 79 1e 61 c3 36 26 a4 3d 62 c0 65 3e 87 b1 70 48 cc 9a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: EAPOL-Key Key MIC - hexdump(len=16): 6a 4c 52 78 e4 3e 75 9a b0 f7 e9 b3 9d cf ab 6d
WPA: Received Key Nonce - hexdump(len=32): 1c 84 a4 d4 a6 19 53 a7 6e 05 1b 5c ca c6 79 1e 61 c3 36 26 a4 3d 62 c0 65 3e 87 b1 70 48 cc 9a
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 04
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55766276c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55766276c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
Disassociation notification for unknown STA 6e:0d:e3:c2:48:9b
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x5576627ad0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x5576627ad0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
Get randomness: len=32 entropy=3
WPA: Assign ANonce - hexdump(len=32): d9 d0 d3 0d da 4e 27 44 13 39 8f 79 32 59 ec e1 b6 4c 70 97 ea 2a 91 e4 b0 6b 47 48 01 2f b1 43
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: RX EAPOL data - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 bc b5 28 ee 25 ab bc 9f d9 d5 66 02 fd d9 85 88 66 90 6e 32 14 87 82 32 d5 c9 f1 81 99 c2 85 e8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a9 a4 30 fa 8b 2a 6c 9c 3b bb a2 e1 63 7e 97 4e 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: EAPOL-Key header (ending before Key MIC) - hexdump(len=77): 02 01 0a 00 00 00 00 00 00 00 00 00 01 bc b5 28 ee 25 ab bc 9f d9 d5 66 02 fd d9 85 88 66 90 6e 32 14 87 82 32 d5 c9 f1 81 99 c2 85 e8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: EAPOL-Key Key MIC - hexdump(len=16): a9 a4 30 fa 8b 2a 6c 9c 3b bb a2 e1 63 7e 97 4e
WPA: Received Key Nonce - hexdump(len=32): bc b5 28 ee 25 ab bc 9f d9 d5 66 02 fd d9 85 88 66 90 6e 32 14 87 82 32 d5 c9 f1 81 99 c2 85 e8
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): d9 d0 d3 0d da 4e 27 44 13 39 8f 79 32 59 ec e1 b6 4c 70 97 ea 2a 91 e4 b0 6b 47 48 01 2f b1 43
WPA: Nonce2 - hexdump(len=32): bc b5 28 ee 25 ab bc 9f d9 d5 66 02 fd d9 85 88 66 90 6e 32 14 87 82 32 d5 c9 f1 81 99 c2 85 e8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 99 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=95
WPA: RX EAPOL data - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 aa 7a 59 c2 96 be 11 5e f0 d5 4f 6b 32 4d 29 3e 00 00
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=0
WPA: EAPOL-Key header (ending before Key MIC) - hexdump(len=77): 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: EAPOL-Key Key MIC - hexdump(len=16): aa 7a 59 c2 96 be 11 5e f0 d5 4f 6b 32 4d 29 3e
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x5576627ad0 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   addr=6e:0d:e3:c2:48:9b
   pairwise key
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x61 flags_or=0x1 flags_and=0xffffffff authorized=1
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: authorizing port
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session ABB342AB1BB22778
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan0(dc:a6:32:53:c0:26) A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
nl80211: MLME event frame - hexdump(len=28): d0 00 00 00 dc a6 32 53 c0 26 6e 0d e3 c2 48 9b dc a6 32 53 c0 26 00 00 0a 06 17 06
nl80211: Frame event
nl80211: RX frame da=dc:a6:32:53:c0:26 sa=6e:0d:e3:c2:48:9b bssid=dc:a6:32:53:c0:26 freq=2412 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=28
wlan0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 10 action 6 sa 6e:0d:e3:c2:48:9b da dc:a6:32:53:c0:26 len 28 freq 2412
Ignore BSS Transition Management Query from 6e:0d:e3:c2:48:9b since BSS Transition Management is disabled
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: RX EAPOL data - hexdump(len=121): 01 03 00 75 02 03 0a 00 00 00 00 00 00 00 00 00 03 ab 87 ae f1 b4 da e3 52 15 15 ba 36 4f 1b 1b 55 e3 64 c1 93 b7 c0 13 a9 28 45 89 b4 3f 58 aa ba 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bb 93 72 2c ca b2 92 8e bb d3 bd 91 e0 6c 1a bf 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: EAPOL-Key header (ending before Key MIC) - hexdump(len=77): 02 03 0a 00 00 00 00 00 00 00 00 00 03 ab 87 ae f1 b4 da e3 52 15 15 ba 36 4f 1b 1b 55 e3 64 c1 93 b7 c0 13 a9 28 45 89 b4 3f 58 aa ba 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: EAPOL-Key Key MIC - hexdump(len=16): bb 93 72 2c ca b2 92 8e bb d3 bd 91 e0 6c 1a bf
WPA: Received Key Nonce - hexdump(len=32): ab 87 ae f1 b4 da e3 52 15 15 ba 36 4f 1b 1b 55 e3 64 c1 93 b7 c0 13 a9 28 45 89 b4 3f 58 aa ba
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: RX EAPOL data - hexdump(len=121): 01 03 00 75 02 03 0a 00 00 00 00 00 00 00 00 00 04 ab 87 ae f1 b4 da e3 52 15 15 ba 36 4f 1b 1b 55 e3 64 c1 93 b7 c0 13 a9 28 45 89 b4 3f 58 aa ba 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8e c2 3b 55 50 dd 0e 17 f5 53 83 93 ee f5 4c 26 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: EAPOL-Key header (ending before Key MIC) - hexdump(len=77): 02 03 0a 00 00 00 00 00 00 00 00 00 04 ab 87 ae f1 b4 da e3 52 15 15 ba 36 4f 1b 1b 55 e3 64 c1 93 b7 c0 13 a9 28 45 89 b4 3f 58 aa ba 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: EAPOL-Key Key MIC - hexdump(len=16): 8e c2 3b 55 50 dd 0e 17 f5 53 83 93 ee f5 4c 26
WPA: Received Key Nonce - hexdump(len=32): ab 87 ae f1 b4 da e3 52 15 15 ba 36 4f 1b 1b 55 e3 64 c1 93 b7 c0 13 a9 28 45 89 b4 3f 58 aa ba
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 04
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x5576627ad0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x5576627ad0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b

the only thing really installed on my raspberry is casaOS, when i find a spare SD card i will try again with just a fresh install, to rule out some problems there...
Thanks for your time

@garywill
Copy link
Owner

garywill commented Nov 4, 2023

WPA: EAPOL-Key MIC using HMAC-SHA1
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=0x559f6f59e0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: invalid MIC in msg 2/4 of 4-Way Handshake
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter

seems your devices can't finish the 2/4 handshake.

I don't know the reason behind that ...

My log after 2/4 handshake is

WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: xxxxxxxx WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: xxxxxxxx WPA_PTK entering state PTKINITNEGOTIATING
x0wlan0: STA xxxxxxxx WPA: sending 3/4 msg of 4-Way Handshake

@garywill
Copy link
Owner

garywill commented Nov 4, 2023

Have you tried shorter ssid and password?

@TobiasDax
Copy link
Author

I tried a lot of different SSIDs and passwords, no help there…

I also tried setting up a hotspot over nmcli, nmtui and over RasAP. All did not work.
I tried it after a fresh install of raspberry pi os lite and after some use, no help.

then yesterday in an act of frustration I installed the full raspberry OS and tried it over the Desktop UI … and it works. Just to be sure I also tried it over nmcli and nmtui and both also work…
I also ran rpi-update on the full os, so I can’t really be sure what fixed it, the non-lite os version or the rpi-update.
But one of those did the trick. When I have time next week I will try an other lite install with rpi-update to check and a full install without just to be sure.

but yeah, that’s how I got it to finally work with the built in raspberry tools. After that I did not try your Skript again since I did not want to break anything :)
But I will also test that next week to give you some feedback.

thanks for your time

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants