garywill / linux-router

Set Linux as router in one command. Support Internet sharing, redsocks, Wifi hotspot, IPv6. Can also be used for routing VM/containers 🛰️ (也欢迎关注B站 https://space.bilibili.com/2123686105 )
GNU Lesser General Public License v2.1
1.67k stars 148 forks source link

Unable to connect to hotspot #65

Open TobiasDax opened 8 months ago

TobiasDax commented 8 months ago

Tried running this on a raspberry pi 4 and at first it seemed to work but i am unable to connect to the Hotspot with my Android Phone or windows PC

i tried to run it with the default settings given in the readme but nothing would connect, then i saw the --hs20 flg and ran that. At first it looked like the same no connection error, but then the whole tool crashed

Here is the complete output

~/linux-router $ sudo ./lnxrouter --ap wlan0 MyAccessPoint -p MyPassPhrase --hs20
WARN: brmfmac driver doesn't work properly with virtual interfaces and
      it can cause kernel panic. For this reason we disallow virtual
      interfaces for your adapter.
      For more info: https://github.com/oblique/create_ap/issues/203
WARN: Your adapter does not fully support AP virtual interface, enabling --no-virt
linux-router 0.7.1b (https://github.com/garywill/linux-router)
Released under LGPL, with no warranty. Use on your own risk.

PID: 18716
Target interface is wlan0 (dc:a6:32:53:c0:26)
Use random LAN IPv4 address 192.168.63.1
Channel not specified, use default
Set wlan0 unmanaged by NetworkManager

haveged_watchdog PID: 18825

Starting hostapd
hostapd PID: 18831
wlan0: interface state UNINITIALIZED->ENABLED
wlan0: AP-ENABLED

iptables v1.8.9 (nf_tables)
NOTICE: Not showing all operations done to iptables rules

iptables: NAT
MASQUERADE  all opt -- in * out !wlan0  192.168.63.0/24 !-> 192.168.63.0/24   /* lrt18716wlan0 */
ACCEPT  all opt -- in wlan0 out *  192.168.63.0/24  -> 0.0.0.0/0   /* lrt18716wlan0 */
ACCEPT  all opt -- in * out wlan0  0.0.0.0/0  -> 192.168.63.0/24   /* lrt18716wlan0 */
Loaded kernel module nf_nat_pptp

iptables: allow DNS
ACCEPT  tcp opt -- in wlan0 out *  192.168.63.0/24  -> 192.168.63.1   tcp dpt:53 /* lrt18716wlan0 */
ACCEPT  udp opt -- in wlan0 out *  192.168.63.0/24  -> 192.168.63.1   udp dpt:53 /* lrt18716wlan0 */

iptables: allow dhcp
ACCEPT  udp opt -- in wlan0 out *  0.0.0.0/0  -> 0.0.0.0/0   udp dpt:67 /* lrt18716wlan0 */

Starting dnsmasq
Nov  2 22:09:24 dnsmasq[18867]: started, version 2.89 cachesize 150
Nov  2 22:09:24 dnsmasq[18867]: compile time options: IPv6 GNU-getopt DBus no-UBus i18n IDN2 DHCP DHCPv6 no-Lua TFTP conntrack ipset nftset auth cryptohash DNSSEC loop-detect inotify dumpfile
Nov  2 22:09:24 dnsmasq-dhcp[18867]: DHCP, IP range 192.168.63.10 -- 192.168.63.250, lease time 1h
Nov  2 22:09:24 dnsmasq-dhcp[18867]: DHCP, sockets bound exclusively to interface wlan0
Nov  2 22:09:24 dnsmasq[18867]: reading /etc/resolv.conf
Nov  2 22:09:24 dnsmasq[18867]: using nameserver 127.0.0.1#53
Nov  2 22:09:24 dnsmasq[18867]: cleared cache
dnsmasq PID: 18867

== Setting up completed, now linux-router should be working ==
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session 87379B80C8056720
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
Nov  2 22:10:01 dnsmasq-dhcp[18867]: DHCPDISCOVER(wlan0) 6e:0d:e3:c2:48:9b
Nov  2 22:10:01 dnsmasq-dhcp[18867]: DHCPOFFER(wlan0) 192.168.63.109 6e:0d:e3:c2:48:9b
Nov  2 22:10:01 dnsmasq-dhcp[18867]: DHCPDISCOVER(wlan0) 6e:0d:e3:c2:48:9b
Nov  2 22:10:01 dnsmasq-dhcp[18867]: DHCPOFFER(wlan0) 192.168.63.109 6e:0d:e3:c2:48:9b
Nov  2 22:10:01 dnsmasq-dhcp[18867]: DHCPDISCOVER(wlan0) 6e:0d:e3:c2:48:9b
Nov  2 22:10:01 dnsmasq-dhcp[18867]: DHCPOFFER(wlan0) 192.168.63.109 6e:0d:e3:c2:48:9b
Nov  2 22:10:01 dnsmasq-dhcp[18867]: DHCPREQUEST(wlan0) 192.168.63.109 6e:0d:e3:c2:48:9b
Nov  2 22:10:01 dnsmasq-dhcp[18867]: DHCPACK(wlan0) 192.168.63.109 6e:0d:e3:c2:48:9b Pixel-6a
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session 03D4083AA987A829
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
Nov  2 22:10:12 dnsmasq-dhcp[18867]: DHCPREQUEST(wlan0) 192.168.63.109 6e:0d:e3:c2:48:9b
Nov  2 22:10:12 dnsmasq-dhcp[18867]: DHCPACK(wlan0) 192.168.63.109 6e:0d:e3:c2:48:9b Pixel-6a
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
Error occured

ERROR: hostapd failed

./lnxrouter: line 1: 18831 Segmentation fault      $STDBUF_PATH hostapd $HOSTAPD_DEBUG_ARGS -P "$CONFDIR/hostapd.pid" "$CONFDIR/hostapd.conf"
Error occured

Doing cleanup..
Nov  2 22:10:22 dnsmasq[18867]: exiting on receipt of SIGTERM
Killed dnsmasq.pid 18867 dnsmasq
Terminated
Killed haveged_watchdog.pid 18825 lnxrouter
Failed to kill hostapd.pid 18831 , it may have exited
Terminated
Killed keep_running.pid 18896 bash
Undoing iptables changes ..
Error occured

ERROR: dnsmasq failed

If i run it with -w 1 i get

~/linux-router $ sudo ./lnxrouter --ap wlan0 MyAccessPoint -p MyPassPhrase -w 1
WARN: brmfmac driver doesn't work properly with virtual interfaces and
      it can cause kernel panic. For this reason we disallow virtual
      interfaces for your adapter.
      For more info: https://github.com/oblique/create_ap/issues/203
WARN: Your adapter does not fully support AP virtual interface, enabling --no-virt
linux-router 0.7.1b (https://github.com/garywill/linux-router)
Released under LGPL, with no warranty. Use on your own risk.

PID: 5013
Target interface is wlan0 (dc:a6:32:53:c0:26)
Use random LAN IPv4 address 192.168.13.1
Channel not specified, use default
Set wlan0 unmanaged by NetworkManager

haveged_watchdog PID: 5120

Starting hostapd
hostapd PID: 5125
wlan0: interface state UNINITIALIZED->ENABLED
wlan0: AP-ENABLED

iptables v1.8.9 (nf_tables)
NOTICE: Not showing all operations done to iptables rules

iptables: NAT
MASQUERADE  all opt -- in * out !wlan0  192.168.13.0/24 !-> 192.168.13.0/24   /* lrt5013wlan0 */
ACCEPT  all opt -- in wlan0 out *  192.168.13.0/24  -> 0.0.0.0/0   /* lrt5013wlan0 */
ACCEPT  all opt -- in * out wlan0  0.0.0.0/0  -> 192.168.13.0/24   /* lrt5013wlan0 */
Loaded kernel module nf_nat_pptp

iptables: allow DNS
ACCEPT  tcp opt -- in wlan0 out *  192.168.13.0/24  -> 192.168.13.1   tcp dpt:53 /* lrt5013wlan0 */
ACCEPT  udp opt -- in wlan0 out *  192.168.13.0/24  -> 192.168.13.1   udp dpt:53 /* lrt5013wlan0 */

iptables: allow dhcp
ACCEPT  udp opt -- in wlan0 out *  0.0.0.0/0  -> 0.0.0.0/0   udp dpt:67 /* lrt5013wlan0 */

Starting dnsmasq
Nov  2 22:15:13 dnsmasq[5162]: started, version 2.89 cachesize 150
Nov  2 22:15:13 dnsmasq[5162]: compile time options: IPv6 GNU-getopt DBus no-UBus i18n IDN2 DHCP DHCPv6 no-Lua TFTP conntrack ipset nftset auth cryptohash DNSSEC loop-detect inotify dumpfile
Nov  2 22:15:13 dnsmasq-dhcp[5162]: DHCP, IP range 192.168.13.10 -- 192.168.13.250, lease time 1h
Nov  2 22:15:13 dnsmasq-dhcp[5162]: DHCP, sockets bound exclusively to interface wlan0
Nov  2 22:15:13 dnsmasq[5162]: reading /etc/resolv.conf
Nov  2 22:15:13 dnsmasq[5162]: using nameserver 127.0.0.1#53
Nov  2 22:15:13 dnsmasq[5162]: cleared cache
dnsmasq PID: 5162

== Setting up completed, now linux-router should be working ==
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated

and with -w 2 i get the same as the default (obvoiusly) but my phone tries to auto connect a few times more

~/linux-router $ sudo ./lnxrouter --ap wlan0 MyAccessPoint -p MyPassPhrase -w 2
WARN: brmfmac driver doesn't work properly with virtual interfaces and
      it can cause kernel panic. For this reason we disallow virtual
      interfaces for your adapter.
      For more info: https://github.com/oblique/create_ap/issues/203
WARN: Your adapter does not fully support AP virtual interface, enabling --no-virt
linux-router 0.7.1b (https://github.com/garywill/linux-router)
Released under LGPL, with no warranty. Use on your own risk.

PID: 6092
Target interface is wlan0 (dc:a6:32:53:c0:26)
Use random LAN IPv4 address 192.168.239.1
Channel not specified, use default
Set wlan0 unmanaged by NetworkManager

haveged_watchdog PID: 6199

Starting hostapd
hostapd PID: 6204
wlan0: interface state UNINITIALIZED->ENABLED
wlan0: AP-ENABLED

iptables v1.8.9 (nf_tables)
NOTICE: Not showing all operations done to iptables rules

iptables: NAT
MASQUERADE  all opt -- in * out !wlan0  192.168.239.0/24 !-> 192.168.239.0/24   /* lrt6092wlan0 */
ACCEPT  all opt -- in wlan0 out *  192.168.239.0/24  -> 0.0.0.0/0   /* lrt6092wlan0 */
ACCEPT  all opt -- in * out wlan0  0.0.0.0/0  -> 192.168.239.0/24   /* lrt6092wlan0 */
Loaded kernel module nf_nat_pptp

iptables: allow DNS
ACCEPT  tcp opt -- in wlan0 out *  192.168.239.0/24  -> 192.168.239.1   tcp dpt:53 /* lrt6092wlan0 */
ACCEPT  udp opt -- in wlan0 out *  192.168.239.0/24  -> 192.168.239.1   udp dpt:53 /* lrt6092wlan0 */

iptables: allow dhcp
ACCEPT  udp opt -- in wlan0 out *  0.0.0.0/0  -> 0.0.0.0/0   udp dpt:67 /* lrt6092wlan0 */

Starting dnsmasq
Nov  2 22:17:29 dnsmasq[6241]: started, version 2.89 cachesize 150
Nov  2 22:17:29 dnsmasq[6241]: compile time options: IPv6 GNU-getopt DBus no-UBus i18n IDN2 DHCP DHCPv6 no-Lua TFTP conntrack ipset nftset auth cryptohash DNSSEC loop-detect inotify dumpfile
Nov  2 22:17:29 dnsmasq-dhcp[6241]: DHCP, IP range 192.168.239.10 -- 192.168.239.250, lease time 1h
Nov  2 22:17:29 dnsmasq-dhcp[6241]: DHCP, sockets bound exclusively to interface wlan0
Nov  2 22:17:29 dnsmasq[6241]: reading /etc/resolv.conf
Nov  2 22:17:29 dnsmasq[6241]: using nameserver 127.0.0.1#53
Nov  2 22:17:29 dnsmasq[6241]: cleared cache
dnsmasq PID: 6241

== Setting up completed, now linux-router should be working ==
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session CA43925BA12E8E04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
Nov  2 22:17:38 dnsmasq-dhcp[6241]: DHCPDISCOVER(wlan0) 6e:0d:e3:c2:48:9b
Nov  2 22:17:38 dnsmasq-dhcp[6241]: DHCPOFFER(wlan0) 192.168.239.109 6e:0d:e3:c2:48:9b
Nov  2 22:17:38 dnsmasq-dhcp[6241]: DHCPDISCOVER(wlan0) 6e:0d:e3:c2:48:9b
Nov  2 22:17:38 dnsmasq-dhcp[6241]: DHCPOFFER(wlan0) 192.168.239.109 6e:0d:e3:c2:48:9b
Nov  2 22:17:38 dnsmasq-dhcp[6241]: DHCPDISCOVER(wlan0) 6e:0d:e3:c2:48:9b
Nov  2 22:17:38 dnsmasq-dhcp[6241]: DHCPOFFER(wlan0) 192.168.239.109 6e:0d:e3:c2:48:9b
Nov  2 22:17:38 dnsmasq-dhcp[6241]: DHCPREQUEST(wlan0) 192.168.239.109 6e:0d:e3:c2:48:9b
Nov  2 22:17:38 dnsmasq-dhcp[6241]: DHCPACK(wlan0) 192.168.239.109 6e:0d:e3:c2:48:9b Pixel-6a
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session 473B6417CC625EE0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
Nov  2 22:17:49 dnsmasq-dhcp[6241]: DHCPREQUEST(wlan0) 192.168.239.109 6e:0d:e3:c2:48:9b
Nov  2 22:17:49 dnsmasq-dhcp[6241]: DHCPACK(wlan0) 192.168.239.109 6e:0d:e3:c2:48:9b Pixel-6a
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
garywill commented 8 months ago

Usually use default options. --hs20 is not needed. Your phone doesn't work with -w 1 apparently. -w 2 seems ok. Just use it without -w, use default.

For now I can't tell which is going wrong, try add --hostapd-debug 1 ( or 2). Let's see if the debug log can tell us something

TobiasDax commented 8 months ago

Yeah, i started with the default options and just tried other stuff when those did not work.

tried again with --hostapd-debug-1

~/linux-router $ sudo ./lnxrouter --ap wlan0 MyAccessPoint -p MyPassPhrase --hostapd-debug 1
WARN: brmfmac driver doesn't work properly with virtual interfaces and
      it can cause kernel panic. For this reason we disallow virtual
      interfaces for your adapter.
      For more info: https://github.com/oblique/create_ap/issues/203
WARN: Your adapter does not fully support AP virtual interface, enabling --no-virt
linux-router 0.7.1b (https://github.com/garywill/linux-router)
Released under LGPL, with no warranty. Use on your own risk.

PID: 79906
Target interface is wlan0 (dc:a6:32:53:c0:26)
Use random LAN IPv4 address 192.168.112.1
Channel not specified, use default
Set wlan0 unmanaged by NetworkManager

haveged_watchdog PID: 80014

Starting hostapd
hostapd PID: 80020
random: getrandom() support available
Configuration file: /dev/shm/lnxrouter_tmp/lnxrouter.wlan0.conf.Kt34RC/hostapd.conf
ctrl_interface_group=0
nl80211: Using driver-based roaming
nl80211: TDLS supported
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:6
nl80211: Using driver-based off-channel TX
nl80211: Supported vendor command: vendor_id=0x1018 subcmd=1
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: Enable multi-channel concurrent (driver advertised support)
nl80211: use P2P_DEVICE support
nl80211: key_mgmt=0xd0f enc=0x10f auth=0x7 flags=0x2000000380cfacc rrm_flags=0x0 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=10
nl80211: interface wlan0 in phy phy0
nl80211: Set mode ifindex 3 iftype 3 (AP)
nl80211: Setup AP(wlan0) - device_ap_sme=1 use_monitor=0
nl80211: Subscribe to mgmt frames with AP handle 0x559f6efb60 (device SME)
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=04 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=0501 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=0503 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=0504 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=06 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=08 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=09 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=0a multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=11 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=12 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x559f6efb60 match=7f multicast=0
nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x559f6efb60 match= multicast=0
nl80211: Enable Probe Request reporting nl_preq=0x559f6f4830
nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x559f6f4830 match= multicast=0
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
nl80211: Add own interface ifindex 3 (ifidx_reason -1)
nl80211: if_indices[16]: 3(-1)
phy: phy0
BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
nl80211: Regulatory information - country=DE (DFS-ETSI)
nl80211: 2400-2483 @ 40 MHz 20 mBm
nl80211: 5150-5250 @ 80 MHz 23 mBm (no outdoor)
nl80211: 5250-5350 @ 80 MHz 20 mBm (no outdoor) (DFS)
nl80211: 5470-5725 @ 160 MHz 26 mBm (DFS)
nl80211: 5725-5875 @ 80 MHz 13 mBm
nl80211: 5945-6425 @ 160 MHz 23 mBm (no outdoor)
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 2484[DISABLED]
nl80211: Mode IEEE 802.11a: 5170 5180 5190 5200 5210 5220 5230 5240 5260[RADAR] 5280[RADAR] 5300[RADAR] 5320[RADAR] 5500[RADAR] 5520[RADAR] 5540[RADAR] 5560[RADAR] 5580[RADAR] 5600[RADAR] 5620[RADAR] 5640[RADAR] 5660[RADAR]
nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 2484[DISABLED]
Completing interface initialization
Mode: IEEE 802.11g  Channel: 1  Frequency: 2412 MHz
hostapd_handle_dfs_offload: iface->cac_started: 0
hostapd_handle_dfs_offload: freq 2412 MHz does not require DFS. Continue channel/AP setup
Proceed with AP/channel setup
nl80211: Set freq 2412 (ht_enabled=0, vht_enabled=0, he_enabled=0, bandwidth=20 MHz, cf1=2412 MHz, cf2=0 MHz)
  * freq=2412
  * he_enabled=0
  * vht_enabled=0
  * ht_enabled=0
  * channel_type=0
RATE[0] rate=10 flags=0x1
RATE[1] rate=20 flags=0x1
RATE[2] rate=55 flags=0x1
RATE[3] rate=110 flags=0x1
RATE[4] rate=60 flags=0x0
RATE[5] rate=90 flags=0x0
RATE[6] rate=120 flags=0x0
RATE[7] rate=180 flags=0x0
RATE[8] rate=240 flags=0x0
RATE[9] rate=360 flags=0x0
RATE[10] rate=480 flags=0x0
RATE[11] rate=540 flags=0x0
hostapd_setup_bss(hapd=0x559f6f0a10 (wlan0), first=1)
nl80211: flush -> DEL_STATION wlan0 (all)
nl80211: Station flush failed: ret=-14 (Bad address)
Using interface wlan0 with hwaddr dc:a6:32:53:c0:26 and ssid "MyAccessPoint"
Deriving WPA PSK based on passphrase
SSID - hexdump_ascii(len=13):
     4d 79 41 63 63 65 73 73 50 6f 69 6e 74            MyAccessPoint
PSK (ASCII passphrase) - hexdump_ascii(len=12): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
random: Got 20/20 random bytes
GMK - hexdump(len=32): [REMOVED]
Key Counter - hexdump(len=32): [REMOVED]
WPA: Delay group state machine start until Beacon frames have been configured
nl80211: Set beacon (beacon_set=0)
nl80211: Beacon head - hexdump(len=64): 80 00 00 00 ff ff ff ff ff ff dc a6 32 53 c0 26 dc a6 32 53 c0 26 00 00 00 00 00 00 00 00 00 00 64 00 11 04 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 0c 12 18 24 03 01 01
nl80211: Beacon tail - hexdump(len=37): 2a 01 04 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 7f 04 00 00 00 02
nl80211: ifindex=3
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=MyAccessPoint
  * beacon_int=100
  * dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x3
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x2
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl80211: beacon_ies - hexdump(len=6): 7f 04 00 00 00 02
nl80211: proberesp_ies - hexdump(len=6): 7f 04 00 00 00 02
nl80211: assocresp_ies - hexdump(len=6): 7f 04 00 00 00 02
wlan0: Deauthenticate all stations at BSS start
nl80211: sta_remove -> DEL_STATION wlan0 ff:ff:ff:ff:ff:ff --> 0 (Success)
WPA: Start group state machine to set initial keys
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x55755b4b78 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set wlan0 operstate 0->1 (UP)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=-95
Failed to set TX queue parameters for queue 0.
nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=-95
Failed to set TX queue parameters for queue 1.
nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=-95
Failed to set TX queue parameters for queue 2.
nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=-95
Failed to set TX queue parameters for queue 3.
wlan0: interface state UNINITIALIZED->ENABLED
wlan0: AP-ENABLED
wlan0: Setup of interface done.
ctrl_iface not configured!
RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
VLAN: RTM_NEWLINK: ifi_index=3 ifname=wlan0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
VLAN: vlan_newlink(wlan0)
VLAN: RTM_NEWLINK: ifi_index=3 ifname=wlan0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
VLAN: vlan_newlink(wlan0)

iptables v1.8.9 (nf_tables)
NOTICE: Not showing all operations done to iptables rules

iptables: NAT
MASQUERADE  all opt -- in * out !wlan0  192.168.112.0/24 !-> 192.168.112.0/24   /* lrt79906wlan0 */
ACCEPT  all opt -- in wlan0 out *  192.168.112.0/24  -> 0.0.0.0/0   /* lrt79906wlan0 */
ACCEPT  all opt -- in * out wlan0  0.0.0.0/0  -> 192.168.112.0/24   /* lrt79906wlan0 */
Loaded kernel module nf_nat_pptp

iptables: allow DNS
ACCEPT  tcp opt -- in wlan0 out *  192.168.112.0/24  -> 192.168.112.1   tcp dpt:53 /* lrt79906wlan0 */
ACCEPT  udp opt -- in wlan0 out *  192.168.112.0/24  -> 192.168.112.1   udp dpt:53 /* lrt79906wlan0 */

iptables: allow dhcp
ACCEPT  udp opt -- in wlan0 out *  0.0.0.0/0  -> 0.0.0.0/0   udp dpt:67 /* lrt79906wlan0 */

Starting dnsmasq
Nov  3 09:17:48 dnsmasq[80056]: started, version 2.89 cachesize 150
Nov  3 09:17:48 dnsmasq[80056]: compile time options: IPv6 GNU-getopt DBus no-UBus i18n IDN2 DHCP DHCPv6 no-Lua TFTP conntrack ipset nftset auth cryptohash DNSSEC loop-detect inotify dumpfile
Nov  3 09:17:48 dnsmasq-dhcp[80056]: DHCP, IP range 192.168.112.10 -- 192.168.112.250, lease time 1h
Nov  3 09:17:48 dnsmasq-dhcp[80056]: DHCP, sockets bound exclusively to interface wlan0
Nov  3 09:17:48 dnsmasq[80056]: reading /etc/resolv.conf
Nov  3 09:17:48 dnsmasq[80056]: using nameserver 127.0.0.1#53
Nov  3 09:17:48 dnsmasq[80056]: cleared cache
dnsmasq PID: 80056

== Setting up completed, now linux-router should be working ==
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71e6c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71e6c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Re-initialize GMK/Counter on first station
GMK - hexdump(len=32): [REMOVED]
Key Counter - hexdump(len=32): [REMOVED]
GTK - hexdump(len=16): [REMOVED]
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x55755b4b78 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
WPA: Assign ANonce - hexdump(len=32): c1 c9 0e 1d 54 d0 99 b9 5f 3b 3e 6a 7e cd 18 86 a8 49 75 dd 9a 52 de b3 9d 76 30 f6 78 fd 14 36
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): c1 c9 0e 1d 54 d0 99 b9 5f 3b 3e 6a 7e cd 18 86 a8 49 75 dd 9a 52 de b3 9d 76 30 f6 78 fd 14 36
WPA: Nonce2 - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=0x559f6f59e0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: invalid MIC in msg 2/4 of 4-Way Handshake
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b WPA: EAPOL-Key timeout
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): c1 c9 0e 1d 54 d0 99 b9 5f 3b 3e 6a 7e cd 18 86 a8 49 75 dd 9a 52 de b3 9d 76 30 f6 78 fd 14 36
WPA: Nonce2 - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=0x559f6f59e0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: invalid MIC in msg 2/4 of 4-Way Handshake
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: EAPOL-Key timeout
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 3)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): c1 c9 0e 1d 54 d0 99 b9 5f 3b 3e 6a 7e cd 18 86 a8 49 75 dd 9a 52 de b3 9d 76 30 f6 78 fd 14 36
WPA: Nonce2 - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=0x559f6f59e0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: invalid MIC in msg 2/4 of 4-Way Handshake
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: EAPOL-Key timeout
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 4)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): c1 c9 0e 1d 54 d0 99 b9 5f 3b 3e 6a 7e cd 18 86 a8 49 75 dd 9a 52 de b3 9d 76 30 f6 78 fd 14 36
WPA: Nonce2 - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=0x559f6f59e0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: invalid MIC in msg 2/4 of 4-Way Handshake
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): df c1 87 52 cf c6 43 cc 24 8d aa cd aa 5a 38 90 57 31 da d6 82 c4 bb 80 7c 89 e0 89 9c 82 2d 02
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: EAPOL-Key timeout
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: PTKSTART: Retry limit 4 reached
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECT
wpa_sta_disconnect STA 6e:0d:e3:c2:48:9b (reason 15)
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 6e:0d:e3:c2:48:9b reason 15
wlan0: ap_sta_disconnect addr 6e:0d:e3:c2:48:9b reason=15
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 3 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71e6c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
wlan0: ap_sta_disconnect: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (5 seconds - AP_MAX_INACTIVITY_AFTER_DEAUTH)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71e6c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71e6c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71e6c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b
wlan0: Removed ap_sta_deauth_cb_timeout timeout for 6e:0d:e3:c2:48:9b
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
Disassociation notification for unknown STA 6e:0d:e3:c2:48:9b
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71ec10 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71ec10 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): dc 71 e2 59 2a 18 eb 77 ca 05 36 6c c0 0a 2d d8 33 f1 2d 6e b6 98 5b d6 60 95 7f 62 f5 de ef 1b
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 2c 0c a7 34 c3 62 50 3a 8b 4f e9 0d ae 5b 3c ea 2c 6a 84 8d dc cf 1a 1b ee d5 ee 6f 8f 57 b0 7f
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): dc 71 e2 59 2a 18 eb 77 ca 05 36 6c c0 0a 2d d8 33 f1 2d 6e b6 98 5b d6 60 95 7f 62 f5 de ef 1b
WPA: Nonce2 - hexdump(len=32): 2c 0c a7 34 c3 62 50 3a 8b 4f e9 0d ae 5b 3c ea 2c 6a 84 8d dc cf 1a 1b ee d5 ee 6f 8f 57 b0 7f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 99 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=95
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=0
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x559f71ec10 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   addr=6e:0d:e3:c2:48:9b
   pairwise key
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x61 flags_or=0x1 flags_and=0xffffffff authorized=1
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: authorizing port
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session 840ECAE5178C8D31
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
nl80211: RX frame da=dc:a6:32:53:c0:26 sa=6e:0d:e3:c2:48:9b bssid=dc:a6:32:53:c0:26 freq=2412 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=28
wlan0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 10 action 6 sa 6e:0d:e3:c2:48:9b da dc:a6:32:53:c0:26 len 28 freq 2412
Ignore BSS Transition Management Query from 6e:0d:e3:c2:48:9b since BSS Transition Management is disabled
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): d4 ec 5d ca 4e c2 a8 5e 14 30 26 bd 27 7a 77 80 6e 5c 75 b2 65 3b 56 b3 ed f1 c7 bc 30 96 93 e6
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): d4 ec 5d ca 4e c2 a8 5e 14 30 26 bd 27 7a 77 80 6e 5c 75 b2 65 3b 56 b3 ed f1 c7 bc 30 96 93 e6
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 04
Nov  3 09:18:54 dnsmasq-dhcp[80056]: DHCPDISCOVER(wlan0) 6e:0d:e3:c2:48:9b
Nov  3 09:18:54 dnsmasq-dhcp[80056]: DHCPOFFER(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b
Nov  3 09:18:54 dnsmasq-dhcp[80056]: DHCPDISCOVER(wlan0) 6e:0d:e3:c2:48:9b
Nov  3 09:18:54 dnsmasq-dhcp[80056]: DHCPOFFER(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b
Nov  3 09:18:54 dnsmasq-dhcp[80056]: DHCPREQUEST(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b
Nov  3 09:18:54 dnsmasq-dhcp[80056]: DHCPACK(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b Pixel-6a
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71ec10 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71ec10 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71efe0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71efe0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): ad 4c 3a a4 d2 24 b7 1e 02 c6 4c e7 0f 7e 3c 2d 64 aa ce b2 71 8c c6 75 1c b5 d3 92 71 83 04 65
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 09 76 ef e4 26 0c 88 dc eb 92 ec 47 d0 1a 87 b0 df 74 c0 33 d2 76 b4 fb b8 87 28 71 50 5e c2 4a
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): ad 4c 3a a4 d2 24 b7 1e 02 c6 4c e7 0f 7e 3c 2d 64 aa ce b2 71 8c c6 75 1c b5 d3 92 71 83 04 65
WPA: Nonce2 - hexdump(len=32): 09 76 ef e4 26 0c 88 dc eb 92 ec 47 d0 1a 87 b0 df 74 c0 33 d2 76 b4 fb b8 87 28 71 50 5e c2 4a
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 99 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=95
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=0
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x559f71efe0 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   addr=6e:0d:e3:c2:48:9b
   pairwise key
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x61 flags_or=0x1 flags_and=0xffffffff authorized=1
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: authorizing port
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session 4DC8C1A8212252F1
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
nl80211: RX frame da=dc:a6:32:53:c0:26 sa=6e:0d:e3:c2:48:9b bssid=dc:a6:32:53:c0:26 freq=2412 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=28
wlan0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 10 action 6 sa 6e:0d:e3:c2:48:9b da dc:a6:32:53:c0:26 len 28 freq 2412
Ignore BSS Transition Management Query from 6e:0d:e3:c2:48:9b since BSS Transition Management is disabled
Nov  3 09:18:58 dnsmasq-dhcp[80056]: DHCPREQUEST(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b
Nov  3 09:18:58 dnsmasq-dhcp[80056]: DHCPACK(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b Pixel-6a
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): b0 30 4e 02 c3 d7 88 19 ab 65 db 9e c9 b8 46 43 7a 84 91 be 48 3d ea 1e 63 7d cd 16 82 90 98 2a
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): b0 30 4e 02 c3 d7 88 19 ab 65 db 9e c9 b8 46 43 7a 84 91 be 48 3d ea 1e 63 7d cd 16 82 90 98 2a
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 04
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71efe0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71efe0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
Disassociation notification for unknown STA 6e:0d:e3:c2:48:9b
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71f550 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71f550 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): 44 60 8c fd e6 d3 4b 6e e6 49 78 33 83 a9 7f 1e 54 25 79 4a 75 dc 5c a6 92 9a a6 d3 59 d5 c1 2f
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): d2 9d a1 ee 78 2d 1d 6d 33 b3 3a ef 80 6a fd f8 76 33 b8 d9 6e fb 5e c0 e9 ca 8e cb 78 0f 53 a6
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): 44 60 8c fd e6 d3 4b 6e e6 49 78 33 83 a9 7f 1e 54 25 79 4a 75 dc 5c a6 92 9a a6 d3 59 d5 c1 2f
WPA: Nonce2 - hexdump(len=32): d2 9d a1 ee 78 2d 1d 6d 33 b3 3a ef 80 6a fd f8 76 33 b8 d9 6e fb 5e c0 e9 ca 8e cb 78 0f 53 a6
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 99 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=95
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=0
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x559f71f550 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   addr=6e:0d:e3:c2:48:9b
   pairwise key
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x61 flags_or=0x1 flags_and=0xffffffff authorized=1
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: authorizing port
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session ECFACD6B50F78A77
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
nl80211: RX frame da=dc:a6:32:53:c0:26 sa=6e:0d:e3:c2:48:9b bssid=dc:a6:32:53:c0:26 freq=2412 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=28
wlan0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 10 action 6 sa 6e:0d:e3:c2:48:9b da dc:a6:32:53:c0:26 len 28 freq 2412
Ignore BSS Transition Management Query from 6e:0d:e3:c2:48:9b since BSS Transition Management is disabled
Nov  3 09:19:03 dnsmasq-dhcp[80056]: DHCPREQUEST(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b
Nov  3 09:19:03 dnsmasq-dhcp[80056]: DHCPACK(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b Pixel-6a
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 12 ee 88 fa c3 2a d2 17 b7 52 0c 09 f1 63 c4 bf 6a 07 b0 79 c5 9b 4b ba 41 19 a2 57 d6 21 a2 6e
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 12 ee 88 fa c3 2a d2 17 b7 52 0c 09 f1 63 c4 bf 6a 07 b0 79 c5 9b 4b ba 41 19 a2 57 d6 21 a2 6e
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 04
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71f550 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71f550 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71f920 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71f920 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): 0d 8c 2e ad dd b5 c8 89 1c 82 81 10 23 64 d7 cc 92 a6 f2 ab be 06 98 2d 1e ea 69 2d cb 42 8a ab
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 59 80 7e 9f c1 5b 32 48 66 34 b7 f2 5c 8c c3 1e 89 b3 60 1f 66 79 50 eb 2c 30 b1 75 32 75 e6 f9
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): 0d 8c 2e ad dd b5 c8 89 1c 82 81 10 23 64 d7 cc 92 a6 f2 ab be 06 98 2d 1e ea 69 2d cb 42 8a ab
WPA: Nonce2 - hexdump(len=32): 59 80 7e 9f c1 5b 32 48 66 34 b7 f2 5c 8c c3 1e 89 b3 60 1f 66 79 50 eb 2c 30 b1 75 32 75 e6 f9
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 99 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=95
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=0
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x559f71f920 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   addr=6e:0d:e3:c2:48:9b
   pairwise key
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x61 flags_or=0x1 flags_and=0xffffffff authorized=1
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: authorizing port
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session 3F0E4FCBF7B5DD94
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
nl80211: RX frame da=dc:a6:32:53:c0:26 sa=6e:0d:e3:c2:48:9b bssid=dc:a6:32:53:c0:26 freq=2412 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=28
wlan0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 10 action 6 sa 6e:0d:e3:c2:48:9b da dc:a6:32:53:c0:26 len 28 freq 2412
Ignore BSS Transition Management Query from 6e:0d:e3:c2:48:9b since BSS Transition Management is disabled
Nov  3 09:19:10 dnsmasq-dhcp[80056]: DHCPREQUEST(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b
Nov  3 09:19:10 dnsmasq-dhcp[80056]: DHCPACK(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b Pixel-6a
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 03 9a 92 f7 3d 0d b7 72 78 03 57 fd 78 14 a1 2e a9 d8 91 d3 11 a5 fa 48 c5 98 c8 d3 d0 be cc b2
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 03 9a 92 f7 3d 0d b7 72 78 03 57 fd 78 14 a1 2e a9 d8 91 d3 11 a5 fa 48 c5 98 c8 d3 d0 be cc b2
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 04
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71f920 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71f920 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
Disassociation notification for unknown STA 6e:0d:e3:c2:48:9b
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71fc40 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71fc40 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): 0a 4a 4c af 5e a6 94 c5 26 49 61 33 8b a0 0c 80 34 44 05 b2 f4 ac dd 30 ad 75 dc 7a 0f f1 d3 19
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): c4 ac 87 0c 06 34 ee 1e 33 df c2 52 55 11 93 65 cc c5 d8 e9 c8 f0 35 0d 18 0f c3 8c ef 70 f9 ff
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): 0a 4a 4c af 5e a6 94 c5 26 49 61 33 8b a0 0c 80 34 44 05 b2 f4 ac dd 30 ad 75 dc 7a 0f f1 d3 19
WPA: Nonce2 - hexdump(len=32): c4 ac 87 0c 06 34 ee 1e 33 df c2 52 55 11 93 65 cc c5 d8 e9 c8 f0 35 0d 18 0f c3 8c ef 70 f9 ff
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 99 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=95
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=0
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x559f71fc40 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   addr=6e:0d:e3:c2:48:9b
   pairwise key
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x61 flags_or=0x1 flags_and=0xffffffff authorized=1
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: authorizing port
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session 3218587E5E72CA38
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
nl80211: RX frame da=dc:a6:32:53:c0:26 sa=6e:0d:e3:c2:48:9b bssid=dc:a6:32:53:c0:26 freq=2412 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=28
wlan0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 10 action 6 sa 6e:0d:e3:c2:48:9b da dc:a6:32:53:c0:26 len 28 freq 2412
Ignore BSS Transition Management Query from 6e:0d:e3:c2:48:9b since BSS Transition Management is disabled
Nov  3 09:19:14 dnsmasq-dhcp[80056]: DHCPREQUEST(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b
Nov  3 09:19:14 dnsmasq-dhcp[80056]: DHCPACK(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b Pixel-6a
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): de ef ae 9a f3 02 21 98 0e 6c 38 4f ea 1d c0 e4 90 df 1a f2 36 66 f9 3c cc 4f d1 66 f7 20 87 bf
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
nl80211: RX frame da=dc:a6:32:53:c0:26 sa=6e:0d:e3:c2:48:9b bssid=dc:a6:32:53:c0:26 freq=2412 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=35
wlan0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 10 action 26 sa 6e:0d:e3:c2:48:9b da dc:a6:32:53:c0:26 len 35 freq 2412
WNM: Received WNM Notification Request frame from 6e:0d:e3:c2:48:9b (dialog_token=19 type=221)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): de ef ae 9a f3 02 21 98 0e 6c 38 4f ea 1d c0 e4 90 df 1a f2 36 66 f9 3c cc 4f d1 66 f7 20 87 bf
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 04
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71fc40 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71fc40 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
Disassociation notification for unknown STA 6e:0d:e3:c2:48:9b
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71ff60 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71ff60 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): f9 5a 23 9c 1f 93 32 fe 89 cd b7 72 26 a3 82 9a a5 f6 63 35 1b 6b 67 4f 44 ec 73 16 9f 26 51 b7
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): ea f5 2d fe fc 26 34 a4 32 22 16 99 fe aa b8 77 a9 a1 a5 e1 da ec c5 ec 05 8a 0d 72 0b 66 8e 81
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): f9 5a 23 9c 1f 93 32 fe 89 cd b7 72 26 a3 82 9a a5 f6 63 35 1b 6b 67 4f 44 ec 73 16 9f 26 51 b7
WPA: Nonce2 - hexdump(len=32): ea f5 2d fe fc 26 34 a4 32 22 16 99 fe aa b8 77 a9 a1 a5 e1 da ec c5 ec 05 8a 0d 72 0b 66 8e 81
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 99 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=95
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=0
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x559f71ff60 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   addr=6e:0d:e3:c2:48:9b
   pairwise key
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x61 flags_or=0x1 flags_and=0xffffffff authorized=1
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: authorizing port
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session E82FD2FE6686785D
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
nl80211: RX frame da=dc:a6:32:53:c0:26 sa=6e:0d:e3:c2:48:9b bssid=dc:a6:32:53:c0:26 freq=2412 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=28
wlan0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 10 action 6 sa 6e:0d:e3:c2:48:9b da dc:a6:32:53:c0:26 len 28 freq 2412
Ignore BSS Transition Management Query from 6e:0d:e3:c2:48:9b since BSS Transition Management is disabled
Nov  3 09:19:22 dnsmasq-dhcp[80056]: DHCPREQUEST(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b
Nov  3 09:19:22 dnsmasq-dhcp[80056]: DHCPACK(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b Pixel-6a
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 32 fd d6 5b 1b 44 fc d6 f0 9c 93 43 84 05 f2 88 97 1c a8 da 51 79 74 71 85 b4 74 87 a3 71 0c e3
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 32 fd d6 5b 1b 44 fc d6 f0 9c 93 43 84 05 f2 88 97 1c a8 da 51 79 74 71 85 b4 74 87 a3 71 0c e3
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 04
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71ff60 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f71ff60 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
Disassociation notification for unknown STA 6e:0d:e3:c2:48:9b
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): 92 0d 4a ce 96 f7 63 6a 70 9b 0e ff c9 c0 ac 66 f3 76 7d 84 b6 c2 75 57 cd 92 06 47 4c 29 21 62
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 21 aa 6c c0 1e b4 30 06 c5 04 c6 85 22 71 ea c9 e2 7c 80 43 a7 a9 41 ca 17 31 a3 6f cc 05 1e c6
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): 92 0d 4a ce 96 f7 63 6a 70 9b 0e ff c9 c0 ac 66 f3 76 7d 84 b6 c2 75 57 cd 92 06 47 4c 29 21 62
WPA: Nonce2 - hexdump(len=32): 21 aa 6c c0 1e b4 30 06 c5 04 c6 85 22 71 ea c9 e2 7c 80 43 a7 a9 41 ca 17 31 a3 6f cc 05 1e c6
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 99 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=95
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=0
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   addr=6e:0d:e3:c2:48:9b
   pairwise key
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x61 flags_or=0x1 flags_and=0xffffffff authorized=1
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: authorizing port
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session 7217086A6BE1F882
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
nl80211: RX frame da=dc:a6:32:53:c0:26 sa=6e:0d:e3:c2:48:9b bssid=dc:a6:32:53:c0:26 freq=2412 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=28
wlan0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 10 action 6 sa 6e:0d:e3:c2:48:9b da dc:a6:32:53:c0:26 len 28 freq 2412
Ignore BSS Transition Management Query from 6e:0d:e3:c2:48:9b since BSS Transition Management is disabled
Nov  3 09:19:26 dnsmasq-dhcp[80056]: DHCPREQUEST(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b
Nov  3 09:19:26 dnsmasq-dhcp[80056]: DHCPACK(wlan0) 192.168.112.109 6e:0d:e3:c2:48:9b Pixel-6a
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 6c 56 49 e9 86 0f 3c 45 00 bd 44 29 f7 bd 4e 90 77 64 36 bc 6e 56 6c 23 c6 7d 5f e0 d4 d3 a4 d5
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 6c 56 49 e9 86 0f 3c 45 00 bd 44 29 f7 bd 4e 90 77 64 36 bc 6e 56 6c 23 c6 7d 5f e0 d4 d3 a4 d5
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 04
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
Disassociation notification for unknown STA 6e:0d:e3:c2:48:9b
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): b0 7a db d1 93 56 f8 95 27 de 13 13 cf 28 bb 9d 81 37 de 24 a5 a5 c8 6d d9 d5 19 80 c8 52 29 76
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): ef 9b 42 e4 ab df b7 b3 67 0d 01 b2 fd e7 3b bd 5d e7 1d 99 50 2a 61 32 51 82 54 21 c0 dd cf 71
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): b0 7a db d1 93 56 f8 95 27 de 13 13 cf 28 bb 9d 81 37 de 24 a5 a5 c8 6d d9 d5 19 80 c8 52 29 76
WPA: Nonce2 - hexdump(len=32): ef 9b 42 e4 ab df b7 b3 67 0d 01 b2 fd e7 3b bd 5d e7 1d 99 50 2a 61 32 51 82 54 21 c0 dd cf 71
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=0x559f6f59e0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: invalid MIC in msg 2/4 of 4-Way Handshake
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b WPA: EAPOL-Key timeout
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): ef 9b 42 e4 ab df b7 b3 67 0d 01 b2 fd e7 3b bd 5d e7 1d 99 50 2a 61 32 51 82 54 21 c0 dd cf 71
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): b0 7a db d1 93 56 f8 95 27 de 13 13 cf 28 bb 9d 81 37 de 24 a5 a5 c8 6d d9 d5 19 80 c8 52 29 76
WPA: Nonce2 - hexdump(len=32): ef 9b 42 e4 ab df b7 b3 67 0d 01 b2 fd e7 3b bd 5d e7 1d 99 50 2a 61 32 51 82 54 21 c0 dd cf 71
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): ef 9b 42 e4 ab df b7 b3 67 0d 01 b2 fd e7 3b bd 5d e7 1d 99 50 2a 61 32 51 82 54 21 c0 dd cf 71
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
pending replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: EAPOL-Key timeout
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): ef 9b 42 e4 ab df b7 b3 67 0d 01 b2 fd e7 3b bd 5d e7 1d 99 50 2a 61 32 51 82 54 21 c0 dd cf 71
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: STA 6e:0d:e3:c2:48:9b WPA: EAPOL-Key timeout
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 05
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 3)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): ef 9b 42 e4 ab df b7 b3 67 0d 01 b2 fd e7 3b bd 5d e7 1d 99 50 2a 61 32 51 82 54 21 c0 dd cf 71
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
Disassociation notification for unknown STA 6e:0d:e3:c2:48:9b
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Assign ANonce - hexdump(len=32): 2c dd 93 23 0f ef 80 7a 26 6d 2a 82 b7 99 31 1f 8d 77 cc f7 41 91 4e 64 eb ab 78 03 64 fc eb fc
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 80 01 9a f2 84 5f 87 35 80 7d 71 ba f5 a8 3d 16 1a 38 38 a6 6a ef 87 9e 7f 6d 4f fe ac e8 da 9f
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): 2c dd 93 23 0f ef 80 7a 26 6d 2a 82 b7 99 31 1f 8d 77 cc f7 41 91 4e 64 eb ab 78 03 64 fc eb fc
WPA: Nonce2 - hexdump(len=32): 80 01 9a f2 84 5f 87 35 80 7d 71 ba f5 a8 3d 16 1a 38 38 a6 6a ef 87 9e 7f 6d 4f fe ac e8 da 9f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=0x559f6f59e0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: invalid MIC in msg 2/4 of 4-Way Handshake
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH 6e:0d:e3:c2:48:9b
wlan0: STA 6e:0d:e3:c2:48:9b WPA: EAPOL-Key timeout
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 80 01 9a f2 84 5f 87 35 80 7d 71 ba f5 a8 3d 16 1a 38 38 a6 6a ef 87 9e 7f 6d 4f fe ac e8 da 9f
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): 2c dd 93 23 0f ef 80 7a 26 6d 2a 82 b7 99 31 1f 8d 77 cc f7 41 91 4e 64 eb ab 78 03 64 fc eb fc
WPA: Nonce2 - hexdump(len=32): 80 01 9a f2 84 5f 87 35 80 7d 71 ba f5 a8 3d 16 1a 38 38 a6 6a ef 87 9e 7f 6d 4f fe ac e8 da 9f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 80 01 9a f2 84 5f 87 35 80 7d 71 ba f5 a8 3d 16 1a 38 38 a6 6a ef 87 9e 7f 6d 4f fe ac e8 da 9f
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
pending replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: EAPOL-Key timeout
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 80 01 9a f2 84 5f 87 35 80 7d 71 ba f5 a8 3d 16 1a 38 38 a6 6a ef 87 9e 7f 6d 4f fe ac e8 da 9f
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 80 01 9a f2 84 5f 87 35 80 7d 71 ba f5 a8 3d 16 1a 38 38 a6 6a ef 87 9e 7f 6d 4f fe ac e8 da 9f
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key msg 2/4 in invalid state (10) - dropped
wlan0: STA 6e:0d:e3:c2:48:9b WPA: EAPOL-Key timeout
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 05
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 3)
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x559f720280 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b

It stays connected for around a second, then tries to reconnect in a loop

tried again with --hostapd-debug 2 since i was already trying

~/linux-router $ sudo ./lnxrouter --ap wlan0 MyAccessPoint -p MyPassPhrase --hostapd-debug 2
WARN: brmfmac driver doesn't work properly with virtual interfaces and
      it can cause kernel panic. For this reason we disallow virtual
      interfaces for your adapter.
      For more info: https://github.com/oblique/create_ap/issues/203
WARN: Your adapter does not fully support AP virtual interface, enabling --no-virt
linux-router 0.7.1b (https://github.com/garywill/linux-router)
Released under LGPL, with no warranty. Use on your own risk.

PID: 81248
Target interface is wlan0 (dc:a6:32:53:c0:26)
Use random LAN IPv4 address 192.168.251.1
Channel not specified, use default
Set wlan0 unmanaged by NetworkManager

haveged_watchdog PID: 81355

Starting hostapd
hostapd PID: 81360
random: getrandom() support available
Configuration file: /dev/shm/lnxrouter_tmp/lnxrouter.wlan0.conf.NINnpo/hostapd.conf
ctrl_interface_group=0
nl80211: Using driver-based roaming
nl80211: TDLS supported
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:6
nl80211: Using driver-based off-channel TX
nl80211: Supported vendor command: vendor_id=0x1018 subcmd=1
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: Enable multi-channel concurrent (driver advertised support)
nl80211: use P2P_DEVICE support
nl80211: key_mgmt=0xd0f enc=0x10f auth=0x7 flags=0x2000000380cfacc rrm_flags=0x0 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=10
nl80211: interface wlan0 in phy phy0
nl80211: Set mode ifindex 3 iftype 3 (AP)
nl80211: Setup AP(wlan0) - device_ap_sme=1 use_monitor=0
nl80211: Subscribe to mgmt frames with AP handle 0x55765f8b60 (device SME)
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=04 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=0501 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=0503 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=0504 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=06 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=08 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=09 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=0a multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=11 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=12 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55765f8b60 match=7f multicast=0
nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x55765f8b60 match= multicast=0
nl80211: Enable Probe Request reporting nl_preq=0x55765fd830
nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x55765fd830 match= multicast=0
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
nl80211: Add own interface ifindex 3 (ifidx_reason -1)
nl80211: if_indices[16]: 3(-1)
phy: phy0
BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
nl80211: Regulatory information - country=DE (DFS-ETSI)
nl80211: 2400-2483 @ 40 MHz 20 mBm
nl80211: 5150-5250 @ 80 MHz 23 mBm (no outdoor)
nl80211: 5250-5350 @ 80 MHz 20 mBm (no outdoor) (DFS)
nl80211: 5470-5725 @ 160 MHz 26 mBm (DFS)
nl80211: 5725-5875 @ 80 MHz 13 mBm
nl80211: 5945-6425 @ 160 MHz 23 mBm (no outdoor)
nl80211: 57000-66000 @ 2160 MHz 40 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 2484[DISABLED]
nl80211: Mode IEEE 802.11a: 5170 5180 5190 5200 5210 5220 5230 5240 5260[RADAR] 5280[RADAR] 5300[RADAR] 5320[RADAR] 5500[RADAR] 5520[RADAR] 5540[RADAR] 5560[RADAR] 5580[RADAR] 5600[RADAR] 5620[RADAR] 5640[RADAR] 5660[RADAR]
nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 2484[DISABLED]
Allowed channel: mode=1 chan=1 freq=2412 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=2 freq=2417 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=3 freq=2422 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=4 freq=2427 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=5 freq=2432 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=6 freq=2437 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=7 freq=2442 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=8 freq=2447 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=9 freq=2452 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=10 freq=2457 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=11 freq=2462 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=12 freq=2467 MHz max_tx_power=20 dBm
Allowed channel: mode=1 chan=13 freq=2472 MHz max_tx_power=20 dBm
Allowed channel: mode=2 chan=34 freq=5170 MHz max_tx_power=23 dBm
Allowed channel: mode=2 chan=36 freq=5180 MHz max_tx_power=23 dBm
Allowed channel: mode=2 chan=38 freq=5190 MHz max_tx_power=23 dBm
Allowed channel: mode=2 chan=40 freq=5200 MHz max_tx_power=23 dBm
Allowed channel: mode=2 chan=42 freq=5210 MHz max_tx_power=23 dBm
Allowed channel: mode=2 chan=44 freq=5220 MHz max_tx_power=23 dBm
Allowed channel: mode=2 chan=46 freq=5230 MHz max_tx_power=23 dBm
Allowed channel: mode=2 chan=48 freq=5240 MHz max_tx_power=23 dBm
Allowed channel: mode=2 chan=52 freq=5260 MHz max_tx_power=20 dBm
Allowed channel: mode=2 chan=56 freq=5280 MHz max_tx_power=20 dBm
Allowed channel: mode=2 chan=60 freq=5300 MHz max_tx_power=20 dBm
Allowed channel: mode=2 chan=64 freq=5320 MHz max_tx_power=20 dBm
Allowed channel: mode=2 chan=100 freq=5500 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=104 freq=5520 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=108 freq=5540 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=112 freq=5560 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=116 freq=5580 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=120 freq=5600 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=124 freq=5620 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=128 freq=5640 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=132 freq=5660 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=136 freq=5680 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=140 freq=5700 MHz max_tx_power=26 dBm
Allowed channel: mode=2 chan=144 freq=5720 MHz max_tx_power=0 dBm
Allowed channel: mode=2 chan=149 freq=5745 MHz max_tx_power=13 dBm
Allowed channel: mode=2 chan=153 freq=5765 MHz max_tx_power=13 dBm
Allowed channel: mode=2 chan=157 freq=5785 MHz max_tx_power=13 dBm
Allowed channel: mode=2 chan=161 freq=5805 MHz max_tx_power=13 dBm
Allowed channel: mode=2 chan=165 freq=5825 MHz max_tx_power=13 dBm
Allowed channel: mode=0 chan=1 freq=2412 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=2 freq=2417 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=3 freq=2422 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=4 freq=2427 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=5 freq=2432 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=6 freq=2437 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=7 freq=2442 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=8 freq=2447 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=9 freq=2452 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=10 freq=2457 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=11 freq=2462 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=12 freq=2467 MHz max_tx_power=20 dBm
Allowed channel: mode=0 chan=13 freq=2472 MHz max_tx_power=20 dBm
Completing interface initialization
Mode: IEEE 802.11g  Channel: 1  Frequency: 2412 MHz
hostapd_handle_dfs_offload: iface->cac_started: 0
hostapd_handle_dfs_offload: freq 2412 MHz does not require DFS. Continue channel/AP setup
Proceed with AP/channel setup
nl80211: Set freq 2412 (ht_enabled=0, vht_enabled=0, he_enabled=0, bandwidth=20 MHz, cf1=2412 MHz, cf2=0 MHz)
  * freq=2412
  * he_enabled=0
  * vht_enabled=0
  * ht_enabled=0
  * channel_type=0
RATE[0] rate=10 flags=0x1
RATE[1] rate=20 flags=0x1
RATE[2] rate=55 flags=0x1
RATE[3] rate=110 flags=0x1
RATE[4] rate=60 flags=0x0
RATE[5] rate=90 flags=0x0
RATE[6] rate=120 flags=0x0
RATE[7] rate=180 flags=0x0
RATE[8] rate=240 flags=0x0
RATE[9] rate=360 flags=0x0
RATE[10] rate=480 flags=0x0
RATE[11] rate=540 flags=0x0
hostapd_setup_bss(hapd=0x55765f9a10 (wlan0), first=1)
nl80211: flush -> DEL_STATION wlan0 (all)
nl80211: Station flush failed: ret=-14 (Bad address)
Using interface wlan0 with hwaddr dc:a6:32:53:c0:26 and ssid "MyAccessPoint"
Deriving WPA PSK based on passphrase
SSID - hexdump_ascii(len=13):
     4d 79 41 63 63 65 73 73 50 6f 69 6e 74            MyAccessPoint
PSK (ASCII passphrase) - hexdump_ascii(len=12): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
random: Got 20/20 random bytes
Get randomness: len=32 entropy=0
GMK - hexdump(len=32): [REMOVED]
Get randomness: len=32 entropy=0
Key Counter - hexdump(len=32): [REMOVED]
WPA: Delay group state machine start until Beacon frames have been configured
nl80211: Set beacon (beacon_set=0)
nl80211: Beacon head - hexdump(len=64): 80 00 00 00 ff ff ff ff ff ff dc a6 32 53 c0 26 dc a6 32 53 c0 26 00 00 00 00 00 00 00 00 00 00 64 00 11 04 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 0c 12 18 24 03 01 01
nl80211: Beacon tail - hexdump(len=37): 2a 01 04 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 7f 04 00 00 00 02
nl80211: ifindex=3
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=MyAccessPoint
  * beacon_int=100
  * dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x3
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x2
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl80211: beacon_ies - hexdump(len=6): 7f 04 00 00 00 02
nl80211: proberesp_ies - hexdump(len=6): 7f 04 00 00 00 02
nl80211: assocresp_ies - hexdump(len=6): 7f 04 00 00 00 02
wlan0: Deauthenticate all stations at BSS start
nl80211: sta_remove -> DEL_STATION wlan0 ff:ff:ff:ff:ff:ff --> 0 (Success)
WPA: Start group state machine to set initial keys
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
Get randomness: len=16 entropy=0
GTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x55654a4b78 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set wlan0 operstate 0->1 (UP)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=-95
Failed to set TX queue parameters for queue 0.
nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=-95
Failed to set TX queue parameters for queue 1.
nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=-95
Failed to set TX queue parameters for queue 2.
nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=-95
Failed to set TX queue parameters for queue 3.
wlan0: interface state UNINITIALIZED->ENABLED
wlan0: AP-ENABLED
wlan0: Setup of interface done.
ctrl_iface not configured!
RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
VLAN: RTM_NEWLINK: ifi_index=3 ifname=wlan0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
VLAN: vlan_newlink(wlan0)
VLAN: RTM_NEWLINK: ifi_index=3 ifname=wlan0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
VLAN: vlan_newlink(wlan0)

iptables v1.8.9 (nf_tables)
NOTICE: Not showing all operations done to iptables rules

iptables: NAT
MASQUERADE  all opt -- in * out !wlan0  192.168.251.0/24 !-> 192.168.251.0/24   /* lrt81248wlan0 */
ACCEPT  all opt -- in wlan0 out *  192.168.251.0/24  -> 0.0.0.0/0   /* lrt81248wlan0 */
ACCEPT  all opt -- in * out wlan0  0.0.0.0/0  -> 192.168.251.0/24   /* lrt81248wlan0 */
Loaded kernel module nf_nat_pptp

iptables: allow DNS
ACCEPT  tcp opt -- in wlan0 out *  192.168.251.0/24  -> 192.168.251.1   tcp dpt:53 /* lrt81248wlan0 */
ACCEPT  udp opt -- in wlan0 out *  192.168.251.0/24  -> 192.168.251.1   udp dpt:53 /* lrt81248wlan0 */

iptables: allow dhcp
ACCEPT  udp opt -- in wlan0 out *  0.0.0.0/0  -> 0.0.0.0/0   udp dpt:67 /* lrt81248wlan0 */

Starting dnsmasq
Nov  3 09:21:50 dnsmasq[81397]: started, version 2.89 cachesize 150
Nov  3 09:21:50 dnsmasq[81397]: compile time options: IPv6 GNU-getopt DBus no-UBus i18n IDN2 DHCP DHCPv6 no-Lua TFTP conntrack ipset nftset auth cryptohash DNSSEC loop-detect inotify dumpfile
Nov  3 09:21:50 dnsmasq-dhcp[81397]: DHCP, IP range 192.168.251.10 -- 192.168.251.250, lease time 1h
Nov  3 09:21:50 dnsmasq-dhcp[81397]: DHCP, sockets bound exclusively to interface wlan0
Nov  3 09:21:50 dnsmasq[81397]: reading /etc/resolv.conf
Nov  3 09:21:50 dnsmasq[81397]: using nameserver 127.0.0.1#53
Nov  3 09:21:50 dnsmasq[81397]: cleared cache
dnsmasq PID: 81397

== Setting up completed, now linux-router should be working ==
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55766276c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55766276c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
WPA: Re-initialize GMK/Counter on first station
Get randomness: len=32 entropy=1
GMK - hexdump(len=32): [REMOVED]
Get randomness: len=32 entropy=0
Key Counter - hexdump(len=32): [REMOVED]
Get randomness: len=16 entropy=0
GTK - hexdump(len=16): [REMOVED]
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x55654a4b78 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
Get randomness: len=32 entropy=0
WPA: Assign ANonce - hexdump(len=32): f6 c2 f1 eb e1 c5 61 41 cd 9b a4 45 89 1f 84 5d 8e ee 80 3b e2 05 d2 87 35 5e d0 fc 76 c0 ea 2f
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: RX EAPOL data - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 59 3e 80 2a fe 3c 3c 28 75 92 f2 6a 5a 40 58 fa ec ba 2c 3e 76 41 b3 d5 24 c1 99 c3 04 95 dc 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d2 af a4 30 b3 fd b0 4e eb a9 20 6f df f8 3e 89 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: EAPOL-Key header (ending before Key MIC) - hexdump(len=77): 02 01 0a 00 00 00 00 00 00 00 00 00 01 59 3e 80 2a fe 3c 3c 28 75 92 f2 6a 5a 40 58 fa ec ba 2c 3e 76 41 b3 d5 24 c1 99 c3 04 95 dc 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: EAPOL-Key Key MIC - hexdump(len=16): d2 af a4 30 b3 fd b0 4e eb a9 20 6f df f8 3e 89
WPA: Received Key Nonce - hexdump(len=32): 59 3e 80 2a fe 3c 3c 28 75 92 f2 6a 5a 40 58 fa ec ba 2c 3e 76 41 b3 d5 24 c1 99 c3 04 95 dc 0c
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): f6 c2 f1 eb e1 c5 61 41 cd 9b a4 45 89 1f 84 5d 8e ee 80 3b e2 05 d2 87 35 5e d0 fc 76 c0 ea 2f
WPA: Nonce2 - hexdump(len=32): 59 3e 80 2a fe 3c 3c 28 75 92 f2 6a 5a 40 58 fa ec ba 2c 3e 76 41 b3 d5 24 c1 99 c3 04 95 dc 0c
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 99 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=95
WPA: RX EAPOL data - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 05 22 ab e4 51 8d e0 d9 e9 9a 47 c8 64 e5 9e 00 00
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=0
WPA: EAPOL-Key header (ending before Key MIC) - hexdump(len=77): 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: EAPOL-Key Key MIC - hexdump(len=16): 1a 05 22 ab e4 51 8d e0 d9 e9 9a 47 c8 64 e5 9e
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x55766276c0 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   addr=6e:0d:e3:c2:48:9b
   pairwise key
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x61 flags_or=0x1 flags_and=0xffffffff authorized=1
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: authorizing port
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session E60E6802E14B0CC6
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan0(dc:a6:32:53:c0:26) A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
nl80211: MLME event frame - hexdump(len=28): d0 00 00 00 dc a6 32 53 c0 26 6e 0d e3 c2 48 9b dc a6 32 53 c0 26 00 00 0a 06 16 06
nl80211: Frame event
nl80211: RX frame da=dc:a6:32:53:c0:26 sa=6e:0d:e3:c2:48:9b bssid=dc:a6:32:53:c0:26 freq=2412 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=28
wlan0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 10 action 6 sa 6e:0d:e3:c2:48:9b da dc:a6:32:53:c0:26 len 28 freq 2412
Ignore BSS Transition Management Query from 6e:0d:e3:c2:48:9b since BSS Transition Management is disabled
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: RX EAPOL data - hexdump(len=121): 01 03 00 75 02 03 0a 00 00 00 00 00 00 00 00 00 03 1c 84 a4 d4 a6 19 53 a7 6e 05 1b 5c ca c6 79 1e 61 c3 36 26 a4 3d 62 c0 65 3e 87 b1 70 48 cc 9a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5f a2 77 00 7f 8c 16 21 3d 13 31 ba 39 62 83 21 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: EAPOL-Key header (ending before Key MIC) - hexdump(len=77): 02 03 0a 00 00 00 00 00 00 00 00 00 03 1c 84 a4 d4 a6 19 53 a7 6e 05 1b 5c ca c6 79 1e 61 c3 36 26 a4 3d 62 c0 65 3e 87 b1 70 48 cc 9a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: EAPOL-Key Key MIC - hexdump(len=16): 5f a2 77 00 7f 8c 16 21 3d 13 31 ba 39 62 83 21
WPA: Received Key Nonce - hexdump(len=32): 1c 84 a4 d4 a6 19 53 a7 6e 05 1b 5c ca c6 79 1e 61 c3 36 26 a4 3d 62 c0 65 3e 87 b1 70 48 cc 9a
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: RX EAPOL data - hexdump(len=121): 01 03 00 75 02 03 0a 00 00 00 00 00 00 00 00 00 04 1c 84 a4 d4 a6 19 53 a7 6e 05 1b 5c ca c6 79 1e 61 c3 36 26 a4 3d 62 c0 65 3e 87 b1 70 48 cc 9a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6a 4c 52 78 e4 3e 75 9a b0 f7 e9 b3 9d cf ab 6d 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: EAPOL-Key header (ending before Key MIC) - hexdump(len=77): 02 03 0a 00 00 00 00 00 00 00 00 00 04 1c 84 a4 d4 a6 19 53 a7 6e 05 1b 5c ca c6 79 1e 61 c3 36 26 a4 3d 62 c0 65 3e 87 b1 70 48 cc 9a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: EAPOL-Key Key MIC - hexdump(len=16): 6a 4c 52 78 e4 3e 75 9a b0 f7 e9 b3 9d cf ab 6d
WPA: Received Key Nonce - hexdump(len=32): 1c 84 a4 d4 a6 19 53 a7 6e 05 1b 5c ca c6 79 1e 61 c3 36 26 a4 3d 62 c0 65 3e 87 b1 70 48 cc 9a
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 04
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55766276c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x55766276c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
Disassociation notification for unknown STA 6e:0d:e3:c2:48:9b
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 6e:0d:e3:c2:48:9b
nl80211: Assoc Req IEs - hexdump(len=108): 00 0d 4d 79 41 63 63 65 73 73 50 6f 69 6e 74 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 05 15 24 02 01 0d 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 3b 15 51 86 85 84 83 81 80 7f 7e 7d 7c 7b 7a 79 78 77 76 75 74 73 51 7f 0a 04 00 08 00 00 00 00 40 00 21 dd 0a 00 10 18 02 00 00 10 00 00 00
wlan0: Event ASSOC (0) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: associated
STA included RSN IE in (Re)AssocReq
  New STA
ap_sta_add: register ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x5576627ad0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 6e:0d:e3:c2:48:9b WPA: start authentication
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x5576627ad0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
WPA: 6e:0d:e3:c2:48:9b WPA_PTK_GROUP entering state IDLE
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state AUTHENTICATION2
Get randomness: len=32 entropy=3
WPA: Assign ANonce - hexdump(len=32): d9 d0 d3 0d da 4e 27 44 13 39 8f 79 32 59 ec e1 b6 4c 70 97 ea 2a 91 e4 b0 6b 47 48 01 2f b1 43
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITPSK
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKSTART
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:0d:e3:c2:48:9b (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: RX EAPOL data - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 bc b5 28 ee 25 ab bc 9f d9 d5 66 02 fd d9 85 88 66 90 6e 32 14 87 82 32 d5 c9 f1 81 99 c2 85 e8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a9 a4 30 fa 8b 2a 6c 9c 3b bb a2 e1 63 7e 97 4e 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: EAPOL-Key header (ending before Key MIC) - hexdump(len=77): 02 01 0a 00 00 00 00 00 00 00 00 00 01 bc b5 28 ee 25 ab bc 9f d9 d5 66 02 fd d9 85 88 66 90 6e 32 14 87 82 32 d5 c9 f1 81 99 c2 85 e8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: EAPOL-Key Key MIC - hexdump(len=16): a9 a4 30 fa 8b 2a 6c 9c 3b bb a2 e1 63 7e 97 4e
WPA: Received Key Nonce - hexdump(len=32): bc b5 28 ee 25 ab bc 9f d9 d5 66 02 fd d9 85 88 66 90 6e 32 14 87 82 32 d5 c9 f1 81 99 c2 85 e8
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=(nil)
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
WPA: Nonce1 - hexdump(len=32): d9 d0 d3 0d da 4e 27 44 13 39 8f 79 32 59 ec e1 b6 4c 70 97 ea 2a 91 e4 b0 6b 47 48 01 2f b1 43
WPA: Nonce2 - hexdump(len=32): bc b5 28 ee 25 ab bc 9f d9 d5 66 02 fd d9 85 88 66 90 6e 32 14 87 82 32 d5 c9 f1 81 99 c2 85 e8
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 6e:0d:e3:c2:48:9b WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 99 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=95
WPA: RX EAPOL data - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 aa 7a 59 c2 96 be 11 5e f0 d5 4f 6b 32 4d 29 3e 00 00
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=0
WPA: EAPOL-Key header (ending before Key MIC) - hexdump(len=77): 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: EAPOL-Key Key MIC - hexdump(len=16): aa 7a 59 c2 96 be 11 5e f0 d5 4f 6b 32 4d 29 3e
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0x5576627ad0 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
   addr=6e:0d:e3:c2:48:9b
   pairwise key
wlan0: AP-STA-CONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x61 flags_or=0x1 flags_and=0xffffffff authorized=1
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: authorizing port
wlan0: STA 6e:0d:e3:c2:48:9b RADIUS: starting accounting session ABB342AB1BB22778
wlan0: STA 6e:0d:e3:c2:48:9b WPA: pairwise key handshake completed (RSN)
wlan0: EAPOL-4WAY-HS-COMPLETED 6e:0d:e3:c2:48:9b
nl80211: Event message available
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan0(dc:a6:32:53:c0:26) A1=dc:a6:32:53:c0:26 A2=6e:0d:e3:c2:48:9b
nl80211: MLME event frame - hexdump(len=28): d0 00 00 00 dc a6 32 53 c0 26 6e 0d e3 c2 48 9b dc a6 32 53 c0 26 00 00 0a 06 17 06
nl80211: Frame event
nl80211: RX frame da=dc:a6:32:53:c0:26 sa=6e:0d:e3:c2:48:9b bssid=dc:a6:32:53:c0:26 freq=2412 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=28
wlan0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 10 action 6 sa 6e:0d:e3:c2:48:9b da dc:a6:32:53:c0:26 len 28 freq 2412
Ignore BSS Transition Management Query from 6e:0d:e3:c2:48:9b since BSS Transition Management is disabled
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: RX EAPOL data - hexdump(len=121): 01 03 00 75 02 03 0a 00 00 00 00 00 00 00 00 00 03 ab 87 ae f1 b4 da e3 52 15 15 ba 36 4f 1b 1b 55 e3 64 c1 93 b7 c0 13 a9 28 45 89 b4 3f 58 aa ba 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bb 93 72 2c ca b2 92 8e bb d3 bd 91 e0 6c 1a bf 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: EAPOL-Key header (ending before Key MIC) - hexdump(len=77): 02 03 0a 00 00 00 00 00 00 00 00 00 03 ab 87 ae f1 b4 da e3 52 15 15 ba 36 4f 1b 1b 55 e3 64 c1 93 b7 c0 13 a9 28 45 89 b4 3f 58 aa ba 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: EAPOL-Key Key MIC - hexdump(len=16): bb 93 72 2c ca b2 92 8e bb d3 bd 91 e0 6c 1a bf
WPA: Received Key Nonce - hexdump(len=32): ab 87 ae f1 b4 da e3 52 15 15 ba 36 4f 1b 1b 55 e3 64 c1 93 b7 c0 13 a9 28 45 89 b4 3f 58 aa ba
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 03
wlan0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 6e:0d:e3:c2:48:9b
   IEEE 802.1X: version=1 type=3 length=117
WPA: RX EAPOL data - hexdump(len=121): 01 03 00 75 02 03 0a 00 00 00 00 00 00 00 00 00 04 ab 87 ae f1 b4 da e3 52 15 15 ba 36 4f 1b 1b 55 e3 64 c1 93 b7 c0 13 a9 28 45 89 b4 3f 58 aa ba 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8e c2 3b 55 50 dd 0e 17 f5 53 83 93 ee f5 4c 26 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: Received EAPOL-Key from 6e:0d:e3:c2:48:9b key_info=0x30a type=2 mic_len=16 key_data_length=22
WPA: EAPOL-Key header (ending before Key MIC) - hexdump(len=77): 02 03 0a 00 00 00 00 00 00 00 00 00 04 ab 87 ae f1 b4 da e3 52 15 15 ba 36 4f 1b 1b 55 e3 64 c1 93 b7 c0 13 a9 28 45 89 b4 3f 58 aa ba 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: EAPOL-Key Key MIC - hexdump(len=16): 8e c2 3b 55 50 dd 0e 17 f5 53 83 93 ee f5 4c 26
WPA: Received Key Nonce - hexdump(len=32): ab 87 ae f1 b4 da e3 52 15 15 ba 36 4f 1b 1b 55 e3 64 c1 93 b7 c0 13 a9 28 45 89 b4 3f 58 aa ba
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 04
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
nl80211: Delete station 6e:0d:e3:c2:48:9b
wlan0: Event DISASSOC (1) received
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.11: disassociated
wlan0: AP-STA-DISCONNECTED 6e:0d:e3:c2:48:9b
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: event 2 notification
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x5576627ad0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state DISCONNECTED
WPA: 6e:0d:e3:c2:48:9b WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x5576627ad0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
   addr=6e:0d:e3:c2:48:9b
   pairwise key
nl80211: set_key failed; err=-22 Invalid argument
RSN: PTK removal from the driver failed
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
wlan0: STA 6e:0d:e3:c2:48:9b IEEE 802.1X: unauthorizing port
nl80211: Set STA flags - ifname=wlan0 addr=6e:0d:e3:c2:48:9b total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wlan0 6e:0d:e3:c2:48:9b --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 6e:0d:e3:c2:48:9b

the only thing really installed on my raspberry is casaOS, when i find a spare SD card i will try again with just a fresh install, to rule out some problems there... Thanks for your time

garywill commented 8 months ago
WPA: EAPOL-Key MIC using HMAC-SHA1
Searching a PSK for 6e:0d:e3:c2:48:9b prev_psk=0x559f6f59e0
wlan0: STA 6e:0d:e3:c2:48:9b WPA: invalid MIC in msg 2/4 of 4-Way Handshake
wlan0: STA 6e:0d:e3:c2:48:9b WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter

seems your devices can't finish the 2/4 handshake.

I don't know the reason behind that ...

My log after 2/4 handshake is

WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: xxxxxxxx WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: xxxxxxxx WPA_PTK entering state PTKINITNEGOTIATING
x0wlan0: STA xxxxxxxx WPA: sending 3/4 msg of 4-Way Handshake
garywill commented 8 months ago

Have you tried shorter ssid and password?

TobiasDax commented 8 months ago

I tried a lot of different SSIDs and passwords, no help there…

I also tried setting up a hotspot over nmcli, nmtui and over RasAP. All did not work. I tried it after a fresh install of raspberry pi os lite and after some use, no help.

then yesterday in an act of frustration I installed the full raspberry OS and tried it over the Desktop UI … and it works. Just to be sure I also tried it over nmcli and nmtui and both also work… I also ran rpi-update on the full os, so I can’t really be sure what fixed it, the non-lite os version or the rpi-update. But one of those did the trick. When I have time next week I will try an other lite install with rpi-update to check and a full install without just to be sure.

but yeah, that’s how I got it to finally work with the built in raspberry tools. After that I did not try your Skript again since I did not want to break anything :) But I will also test that next week to give you some feedback.

thanks for your time