qpSHiNqp / airport-bssid

If you want to get associated to a specific bssid with Mac OS, use this one.
107 stars 34 forks source link

I can not connect to the BSSID by this tool with macOS mojave 10.14.3 #8

Open buddhist182 opened 5 years ago

buddhist182 commented 5 years ago

I have tried this tool on my mac with version macOS mojave 10.14.3,but it does not work,the detail is : Notice: The interface en0 is in 802.11ac phyMode. Scanned networks ESSID, BSSID, Ch, RSSI(dBm) 12345678, (null), 157, -61 DIRECT-M7-客厅的小米盒子, (null), 1, -62 HUAWEI-176A, (null), 10, -60 PandoraBox-2.4G-B663AB, (null), 10, -61 ROKID.CLOUD, (null), 11, -54 ROKID.GUEST, (null), 11, -54 ROKID.HOMEBASE-2.4G, (null), 11, -70 ROKID.HOMEBASE-5G, (null), 149, -82 ROKID.IOT, (null), 6, -68 ROKID.OFFICE, (null), 157, -88 ROKID.TC, (null), 6, -67 ROKID.TEXT, (null), 1, -59 SmartLife-B06F, (null), 1, -38 Xiaomi_71_2.4G, (null), 1, -52 rokid-22D-1F, (null), 1, -45


All the BSSID is null,and there is many bssid lost,the bssid scanned by airport is :

                        SSID BSSID             RSSI CHANNEL HT CC SECURITY (auth/unicast/group)
                    ROKID.TC 04:40:a9:57:db:60 -69  1       Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                 ROKID.GUEST 04:40:a9:57:db:62 -67  1       Y  CN WPA(PSK/AES/AES)
                ROKID.OFFICE 04:40:a9:57:db:65 -66  1       Y  CN NONE
                 ROKID.CLOUD 04:40:a9:57:e4:f1 -60  1       Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                 ROKID.GUEST 04:40:a9:57:e4:f2 -60  1       Y  CN WPA(PSK/AES/AES)
                  ROKID.TEXT 04:40:a9:57:e4:f3 -61  1       Y  CN WPA(PSK/AES/AES)
                ROKID.OFFICE 04:40:a9:57:e4:f5 -61  1       Y  CN NONE
                 ROKID.GUEST 04:40:a9:a1:c1:b3 -66  6       Y  CN WPA(PSK/AES/AES)
                  ROKID.TEXT 04:40:a9:a1:c1:b4 -65  6       Y  CN WPA(PSK/AES/AES)
                ROKID.OFFICE 04:40:a9:a1:c1:b6 -66  6       Y  CN NONE
                 ROKID.CLOUD 04:40:a9:57:db:61 -66  1       Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                  ROKID.TEXT 04:40:a9:57:db:63 -66  1       Y  CN WPA(PSK/AES/AES)
                    ROKID.TC 04:40:a9:a1:c1:b0 -69  6       Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                   ROKID.IOT 04:40:a9:a1:c1:b1 -66  6       Y  CN WPA2(PSK/AES/AES)
                 ROKID.CLOUD 04:40:a9:a1:c1:b2 -67  6       Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                    ROKID.TC 04:40:a9:57:f1:e0 -53  11      Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                 ROKID.CLOUD 04:40:a9:57:e4:e1 -73  157,+1  Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                 ROKID.GUEST 04:40:a9:57:f1:e2 -53  11      Y  CN WPA(PSK/AES/AES)
                 ROKID.CLOUD 04:40:a9:57:f1:e1 -52  11      Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                ROKID.OFFICE 04:40:a9:57:e4:d5 -67  60,+1   Y  CN NONE
                  ROKID.TEXT 04:40:a9:57:e4:d3 -67  60,+1   Y  CN WPA(PSK/AES/AES)
                 ROKID.GUEST 04:40:a9:57:e4:d2 -67  60,+1   Y  CN WPA(PSK/AES/AES)
                 ROKID.CLOUD 04:40:a9:57:e4:d1 -67  60,+1   Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                    ROKID.TC 04:40:a9:57:e4:d0 -66  60,+1   Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                ROKID.OFFICE 04:40:a9:57:fe:75 -42  11      Y  CN NONE
                  ROKID.TEXT 04:40:a9:57:fe:73 -42  11      Y  CN WPA(PSK/AES/AES)
                 ROKID.GUEST 04:40:a9:57:fe:72 -41  11      Y  CN WPA(PSK/AES/AES)
                 ROKID.CLOUD 04:40:a9:57:fe:71 -41  11      Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                    ROKID.TC 04:40:a9:57:fe:70 -42  11      Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
         ROKID.HOMEBASE-2.4G 6c:b0:ce:11:e5:6f -69  11      Y  -- WPA2(PSK/AES/AES)
                 HUAWEI-176A 14:9d:09:04:17:6a -62  10      Y  -- WPA2(PSK/AES/AES)
      PandoraBox-2.4G-B663AB fc:7c:02:b6:63:ab -60  10      Y  CN NONE
                ROKID.OFFICE 04:40:a9:57:f1:e5 -52  11      Y  CN NONE
                  ROKID.TEXT 04:40:a9:57:f1:e3 -52  11      Y  CN WPA(PSK/AES/AES)
                    12345678 50:64:2b:61:4e:d3 -37  6       Y  CN WPA(PSK/TKIP,AES/TKIP) WPA2(PSK/TKIP,AES/TKIP)
                    ROKID.TC 04:40:a9:57:e4:f0 -61  1       Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)

DIRECT-M7-客厅的小米盒子 8e:5a:f8:0e:5c:8a -62 1 Y -- WPA2(PSK/AES/AES) rokid-22D-1F b8:f8:83:e5:6f:61 -46 1,+1 Y -- WPA(PSK/AES,TKIP/TKIP) WPA2(PSK/AES,TKIP/TKIP) SmartLife-B06F 5e:cf:7f:34:b0:6f -38 1 N -- NONE Xiaomi_71_2.4G 8c:be:be:30:71:d0 -53 1 Y -- WPA(PSK/AES,TKIP/TKIP) WPA2(PSK/AES,TKIP/TKIP) ROKID.OFFICE 04:40:a9:a1:bd:25 -85 36 Y CN NONE ROKID.TEXT 04:40:a9:a1:bd:23 -83 36 Y CN WPA(PSK/AES/AES) ROKID.GUEST 04:40:a9:a1:bd:22 -83 36 Y CN WPA(PSK/AES/AES) ROKID.CLOUD 04:40:a9:a1:bd:21 -83 36 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.TC 04:40:a9:a1:bd:20 -84 36 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.TEXT 04:40:a9:a1:c2:63 -86 157 Y CN WPA(PSK/AES/AES) ROKID.OFFICE 04:40:a9:57:e4:e5 -72 157,+1 Y CN NONE ROKID.TEXT 04:40:a9:57:e4:e3 -73 157,+1 Y CN WPA(PSK/AES/AES) ROKID.OFFICE 04:40:a9:a1:c2:65 -89 157 Y CN NONE ROKID.GUEST 04:40:a9:57:e4:e2 -72 157,+1 Y CN WPA(PSK/AES/AES) ROKID.GUEST 04:40:a9:a1:c2:62 -87 157 Y CN WPA(PSK/AES/AES) ROKID.TC 04:40:a9:57:e4:e0 -72 157,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.CLOUD 04:40:a9:a1:c2:61 -87 157 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.TC 04:40:a9:a1:c2:60 -87 157 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.OFFICE 04:40:a9:57:f1:c5 -64 157,+1 Y CN NONE ROKID.OFFICE 04:40:a9:57:fe:65 -54 157,+1 Y CN NONE ROKID.TEXT 04:40:a9:57:f1:c3 -64 157,+1 Y CN WPA(PSK/AES/AES) ROKID.TEXT 04:40:a9:57:fe:63 -54 157,+1 Y CN WPA(PSK/AES/AES) ROKID.GUEST 04:40:a9:57:f1:c2 -64 157,+1 Y CN WPA(PSK/AES/AES) ROKID.GUEST 04:40:a9:57:fe:62 -52 157,+1 Y CN WPA(PSK/AES/AES) ROKID.CLOUD 04:40:a9:57:f1:c1 -64 157,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.CLOUD 04:40:a9:57:fe:61 -54 157,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.TC 04:40:a9:57:f1:c0 -64 157,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.TC 04:40:a9:57:fe:60 -53 157,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) 12345678 50:64:2b:61:4e:d4 -58 157 Y CN WPA(PSK/TKIP,AES/TKIP) WPA2(PSK/TKIP,AES/TKIP) ROKID.OFFICE 04:40:a9:a1:c1:a6 -81 149 Y CN NONE ROKID.TEXT 04:40:a9:a1:c1:a4 -81 149 Y CN WPA(PSK/AES/AES) ROKID.OFFICE 04:40:a9:57:f1:d5 -59 149,+1 Y CN NONE ROKID.GUEST 04:40:a9:a1:c1:a3 -80 149 Y CN WPA(PSK/AES/AES) ROKID.TEXT 04:40:a9:57:f1:d3 -59 149,+1 Y CN WPA(PSK/AES/AES) ROKID.GUEST 04:40:a9:57:f1:d2 -59 149,+1 Y CN WPA(PSK/AES/AES) ROKID.CLOUD 04:40:a9:57:f1:d1 -59 149,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.HOMEBASE-5G 6c:b0:ce:11:e5:71 -81 149,+1 Y -- WPA2(PSK/AES/AES) ROKID.TC 04:40:a9:57:f1:d0 -59 149,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.CLOUD 04:40:a9:a1:c1:a2 -80 149 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.IOT 04:40:a9:a1:c1:a1 -81 149 Y CN WPA2(PSK/AES/AES) ROKID.TC 04:40:a9:a1:c1:a0 -80 149 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.OFFICE 04:40:a9:57:fe:55 -44 44,+1 Y CN NONE ROKID.TEXT 04:40:a9:57:fe:53 -44 44,+1 Y CN WPA(PSK/AES/AES) ROKID.GUEST 04:40:a9:57:fe:52 -44 44,+1 Y CN WPA(PSK/AES/AES) ROKID.CLOUD 04:40:a9:57:fe:51 -43 44,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.TC 04:40:a9:57:fe:50 -43 44,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)

Can any one git some solution? Thanks!

Moorviper commented 5 years ago

location services enabled ?

sushihangover commented 5 years ago

Same problem on 10.14.6, all the BSSID/Macs are returned as null thus it can not find/connect the correct AP.

***** Scanned networks *****
                   ESSID,             BSSID,  Ch, RSSI(dBm)
         AndroidRepeater,            (null),   2, -22
               CableWiFi,            (null),   1, -86
                 XFINITY,            (null),   1, -84
                  iPhone,            (null),   1, -71
             xfinitywifi,            (null),   6, -78
dayongkr commented 4 years ago

Same problem on 10.15

Moorviper commented 4 years ago

have you downloaded the precompiled binary then this is normal ;-) After downloading the source and compile it by myself it worked for me. at least up to 10.14 / haven't installed 10.15 yet

And also when you have disabled the location services on the system settings which is a bullsh** requirement to get the bssid from the wifi firmware .... :-/

vwade commented 4 years ago

I am actually both ahead and behind a bit on this issue.

On the one hand, I can successfully associate and connect to a specific BSSID. For example,

$ airport-bssid en1 00:f6:63:cd:4b:2f

On the other hand, I do not know how to enter AES/EAP-PEAP (MSCHAPv2) authentication into the command line and, as such, 802.1X cannot authenticate (username & password). My device connects and obtains a self-assigned IP address, but then idles endlessly as it cannot authenticate. As an example,

$ airport-bssid en1 00:f6:63:cd:4b:2f <username> <password>

I am trying to connect to a single access point within a building's wifi mesh. It's due to the fact that some nodes are highly problematic, and connecting to them results in me being disconnected from the internet.

What could help me is knowing how to include my credentials in the command line for authentication. Thanks!!

vesper8 commented 4 years ago

did you ever figure out how to pass your credentials @vwade ?

or did you figure out an alternative on how to connect to a specific bssid on OSX Mojave?

sbliven commented 3 years ago

I'm also seeing (null) BSSID on 10.15 Catalina.

Always get the same result

$ sudo build/Release/airport-bssid
Interface: en0
PHY mode: 802.11ac.
***** Scanned networks *****
                 ESSID,             BSSID,  Ch, RSSI(dBm)
                 Printer,          (null),  11, -51
                 myNet,            (null), 100, -76
                 myNet,            (null),  10, -59
                 Neighbors,        (null),   6, -73
****************************
Network scan completed. If you want to connect to a specific BSSID, please enter the command below:
airport-bssid <ifname> <bssid> [<password>]
gMan1990 commented 3 years ago

BSSID always null on 10.14.6, ME293xx/A

alexgershberg commented 1 year ago

Same issue for me :( 13.3.1

giuliomoro commented 1 year ago

As I was getting BSSID always NULL on Monterey, I forked the project and allow to specify SSID and channel to achieve something similar. https://github.com/giuliomoro/airport-ssid-channel

Of course you are still fighting against airport's setting which may switch network based on its JoinMode.

eleweek commented 12 months ago

@giuliomoro Thank you for this, the tool seems to be helpful for me. One thing you might want to do is to delete the old build of the original tool from ./Build/Release