Public bug reported: wifi woefully poor connection speeds (6Mbps - 70Mbps - flakey at the top end)when compared to windows 270-300Mbps, slow but steady. I've even resorted to attempting to use ndiswrapper which loads the drivers and even appears to get the card going, however despite wpa_supplicant installed and everything set up ok, the connections to my routers fail (they negotiate wpa fine). So back to trying to get these bcmwl kernel drivers working again. I got the card on a quick Google search for a wifi AC card with linux support. I saw broadcom had drivers for it, so I bought it a few months ago. Its been a pain ever since.
Anyway, per https://help.ubuntu.com/community/WifiDocs/Driver/bcm43xx There is some data attached to this bug report I'm sure, however to assist I'll post the extra terminal content and some of the ndiswrapper stuff as it might help as a comparison: ________________________ lspci -vvnn | grep -A 9 Network lsb_release -rd uname -a sudo dmidecode -s bios-version sudo dmidecode -s bios-release-date ________________________ Respectively: ________________________ 0a:00.0 Network controller [0280]: Broadcom Corporation BCM4360 802.11ac Wireless Network Adapter [14e4:43a0] (rev 03) Subsystem: Broadcom Corporation BCM4360 802.11ac Wireless Network Adapter [14e4:0619] Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR+ FastB2B- DisINTx- Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- <TAbort- <MAbort- >SERR- <PERR- INTx- Latency: 0, Cache Line Size: 32 bytes Interrupt: pin A routed to IRQ 19 Region 0: Memory at f7ef8000 (64-bit, non-prefetchable) [size=32K] Region 2: Memory at f7c00000 (64-bit, non-prefetchable) [size=2M] Capabilities: <access denied> Kernel driver in use: wl Kernel modules: bcma, wl Description: Ubuntu 16.04 LTS Release: 16.04 Linux HerculesLinux 4.4.0-18-generic #34-Ubuntu SMP Wed Apr 6 14:01:02 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux 1703 06/26/2012 ________________________ ok - so ndiswrapper attempted workaround using bcmwl5.inf bcmwl564.sys 14E4:43A0.5.conf ________________________ $ sudo rmmod wl $ sudo rmmod cfg80211 $ sudo modprobe ndiswrapper dmesg: [ 8719.640644] ndiswrapper version 1.59 loaded (smp=yes, preempt=no) [ 8719.874630] ndiswrapper: driver bcmwl5 (TP-LINK,11/07/2013, 6.30.223.201) loaded [ 8719.894483] ndiswrapper: using IRQ 19 [ 8720.125536] wlan0: ethernet device c4:e9:84:96:11:2a using NDIS driver: bcmwl5, version: 0x61edfc9, NDIS version: 0x501, vendor: 'NDIS Network Adapter', 14E4:43A0.5.conf [ 8720.126460] wlan0: encryption modes supported: WEP; TKIP with WPA, WPA2, WPA2-PSK; AES/CCMP with WPA, WPA2, WPA2-PSK [ 8720.126870] ndiswrapper 0000:0a:00.0 enp10s0: renamed from wlan0 [ 8720.134408] usbcore: registered new interface driver ndiswrapper [ 8720.143260] ndiswrapper: interface renamed to 'enp10s0' [ 8720.177929] cfg80211: World regulatory domain updated: [ 8720.177932] cfg80211: DFS Master region: unset [ 8720.177933] cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp), (dfs_cac_time) [ 8720.177935] cfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A) [ 8720.177936] cfg80211: (2457000 KHz - 2482000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A) [ 8720.177937] cfg80211: (2474000 KHz - 2494000 KHz @ 20000 KHz), (N/A, 2000 mBm), (N/A) [ 8720.177939] cfg80211: (5170000 KHz - 5250000 KHz @ 80000 KHz, 160000 KHz AUTO), (N/A, 2000 mBm), (N/A) [ 8720.177940] cfg80211: (5250000 KHz - 5330000 KHz @ 80000 KHz, 160000 KHz AUTO), (N/A, 2000 mBm), (0 s) [ 8720.177942] cfg80211: (5490000 KHz - 5730000 KHz @ 160000 KHz), (N/A, 2000 mBm), (0 s) [ 8720.177943] cfg80211: (5735000 KHz - 5835000 KHz @ 80000 KHz), (N/A, 2000 mBm), (N/A) [ 8720.177944] cfg80211: (57240000 KHz - 63720000 KHz @ 2160000 KHz), (N/A, 0 mBm), (N/A) ________________________ sudo wpa_supplicant -D wext -i enp10s0 -c/etc/wpa_supplicant.conf -d > wpa_supplicant_output.txt ________________________ wpa_supplicant v2.4 random: Trying to read entropy from /dev/random Successfully initialized wpa_supplicant Initializing interface 'enp10s0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' Reading configuration file '/etc/wpa_supplicant.conf' Priority group 3 id=2 ssid='ChateauXXXXX' Priority group 2 id=1 ssid='ChateauXXXXX' Priority group 1 id=0 ssid='ChateauXXXXX' SIOCGIWRANGE: WE(compiled)=22 WE(source)=19 enc_capa=0xf capabilities: key_mgmt 0xf enc 0x1f flags 0x0 netlink: Operstate: ifindex=5 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT) Add interface enp10s0 to a new radio N/A enp10s0: Own MAC address: c4:e9:XX:XX:XX:XX wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0 ioctl[SIOCSIWENCODEEXT]: Invalid argument Driver did not support SIOCSIWENCODEEXT wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0 ioctl[SIOCSIWENCODEEXT]: Invalid argument Driver did not support SIOCSIWENCODEEXT wpa_driver_wext_set_countermeasures enp10s0: RSN: flushing PMKID list in the driver enp10s0: Setting scan request: 0.100000 sec TDLS: TDLS operation not supported by driver TDLS: Driver uses internal link setup TDLS: Driver does not support TDLS channel switching enp10s0: WPS: UUID based on MAC address: e53fbfbc-e5a2-XXXX-XXXX-XXXXXXXXXXXX ENGINE: Loading dynamic engine ENGINE: Loading dynamic engine EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED enp10s0: Added interface enp10s0 enp10s0: State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) random: Got 20/20 bytes from /dev/random RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=48 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event enp10s0: State: DISCONNECTED -> SCANNING enp10s0: Starting AP scan for wildcard SSID enp10s0: Add radio work 'scan'@0x55c37e2c9fe0 enp10s0: First radio work item in the queue - schedule start immediately enp10s0: Starting radio work 'scan'@0x55c37e2c9fe0 after 0.000072 second wait Scan requested (ret=0) - scan timeout 10 seconds EAPOL: disable timer tick Ignore event for foreign ifindex 3 Scan timeout - try to get results enp10s0: Event SCAN_RESULTS (3) received Received 2691 bytes of scan results (4 BSSes) enp10s0: BSS: Start scan result update 1 enp10s0: BSS: Add new id 0 BSSID 78:a0:XX:XX:XX:XX SSID 'ChateauXXXXX' enp10s0: BSS: Add new id 1 BSSID 90:e3:XX:XX:XX:XX SSID 'ChateauXXXXX' enp10s0: BSS: Add new id 2 BSSID 04:bd:88:XX:XX:XX SSID 'XXXXXX' enp10s0: BSS: Add new id 3 BSSID 04:bd:88:XX:XX:XX SSID 'XXXXXX' BSS: last_scan_res_used=4/32 enp10s0: New scan results available (own=0 ext=0) WPS: AP 78:a0:XX:XX:XX:XX type 0 added WPS: AP 90:e3:XX:XX:XX:XX type 0 added WPS: AP[0] 78:a0:XX:XX:XX:XX type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] 90:e3:XX:XX:XX:XX type=0 tries=0 last_attempt=-1 sec ago blacklist=0 enp10s0: Radio work 'scan'@0x55c37e2c9fe0 done in 10.002111 seconds enp10s0: Selecting BSS from priority group 3 enp10s0: 0: 78:a0:XX:XX:XX:XX ssid='ChateauXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-61 wps enp10s0: skip - BSSID mismatch enp10s0: 1: 90:e3:XX:XX:XX:XX ssid='ChateauXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-73 wps enp10s0: skip - BSSID mismatch enp10s0: 2: 04:bd:88:XX:XX:XX ssid='XXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-74 enp10s0: skip - SSID mismatch enp10s0: 3: 04:bd:88:XX:XX:XX ssid='XXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-77 enp10s0: skip - SSID mismatch enp10s0: Selecting BSS from priority group 2 enp10s0: 0: 78:a0:XX:XX:XX:XX ssid='ChateauXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-61 wps enp10s0: skip - BSSID mismatch enp10s0: 1: 90:e3:XX:XX:XX:XX ssid='ChateauXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-73 wps enp10s0: selected based on RSN IE enp10s0: selected BSS 90:e3:XX:XX:XX:XX ssid='ChateauXXXXX' enp10s0: Considering connect request: reassociate: 0 selected: 90:e3:XX:XX:XX:XX bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55c37e2ac420 current_ssid=(nil) enp10s0: Request association with 90:e3:XX:XX:XX:XX WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=15): 00 0d 43 68 61 74 65 61 75 42 75 6c 6c 6f 77 WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 03 01 09 WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 2a 01 00 WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=24): 3d 16 09 0f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: WMM Parameter Element - hexdump(len=24): 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS enp10s0: Add radio work 'connect'@0x55c37e2c9fe0 enp10s0: First radio work item in the queue - schedule start immediately enp10s0: Starting radio work 'connect'@0x55c37e2c9fe0 after 0.000084 second wait enp10s0: Trying to associate with 90:e3:XX:XX:XX:XX (SSID='ChateauXXXXX' freq=2452 MHz) FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): enp10s0: Cancelling scan request enp10s0: WPA: clearing own WPA/RSN IE enp10s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=0x55c37e2ac420 try_opportunistic=0 RSN: Search for BSSID 90:e3:XX:XX:XX:XX RSN: No PMKSA cache entry found enp10s0: RSN: using IEEE 802.11i/D9.0 enp10s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 enp10s0: WPA: Selected mgmt group cipher 32 enp10s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 enp10s0: WPA: using GTK CCMP enp10s0: WPA: using PTK CCMP enp10s0: WPA: using KEY_MGMT WPA-PSK enp10s0: WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 enp10s0: State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) Limit connection to BSSID 90:e3:XX:XX:XX:XX freq=2452 MHz based on scan results (bssid_set=1) enp10s0: set_disable_max_amsdu: -1 enp10s0: set_ampdu_factor: -1 enp10s0: set_ampdu_density: -1 enp10s0: set_disable_ht40: 0 enp10s0: set_disable_sgi: 0 enp10s0: set_disable_ldpc: 0 enp10s0: Determining shared radio frequencies (max len 1) enp10s0: Shared frequencies (len=0): completed iteration wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk enp10s0: Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b04 len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=29 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 78:a0:XX:XX:XX:XX enp10s0: Event ASSOC (0) received enp10s0: State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) enp10s0: Associated to a new BSS: BSSID=78:a0:XX:XX:XX:XX enp10s0: Associated with 78:a0:XX:XX:XX:XX enp10s0: WPA: Association event - clear replay counter enp10s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE enp10s0: Setting authentication timeout: 10 sec 0 usec enp10s0: Cancelling scan request l2_packet_receive: src=78:a0:XX:XX:XX:XX len=121 enp10s0: RX EAPOL from 78:a0:XX:XX:XX:XX enp10s0: Setting authentication timeout: 10 sec 0 usec enp10s0: IEEE 802.1X RX: version=2 type=3 length=117 enp10s0: EAPOL-Key type=2 enp10s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) enp10s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f3 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 enp10s0: State: ASSOCIATED -> 4WAY_HANDSHAKE enp10s0: WPA: RX message 1 of 4-Way Handshake from 78:a0:XX:XX:XX:XX (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a RSN: PMKID from Authenticator - hexdump(len=16): 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a enp10s0: RSN: no matching PMKID found WPA: Renewed SNonce - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77 WPA: PTK derivation - A1=c4:e9:XX:XX:XX:XX A2=78:a0:XX:XX:XX:XX WPA: Nonce1 - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77 WPA: Nonce2 - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f3 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 enp10s0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 9f 49 2f 79 22 44 57 d6 3f f8 29 2b 44 e4 3f a3 l2_packet_receive: src=78:a0:XX:XX:XX:XX len=121 enp10s0: RX EAPOL from 78:a0:XX:XX:XX:XX enp10s0: IEEE 802.1X RX: version=2 type=3 length=117 enp10s0: EAPOL-Key type=2 enp10s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) enp10s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f4 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 enp10s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE enp10s0: WPA: RX message 1 of 4-Way Handshake from 78:a0:XX:XX:XX:XX (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a RSN: PMKID from Authenticator - hexdump(len=16): 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a enp10s0: RSN: no matching PMKID found WPA: PTK derivation - A1=c4:e9:XX:XX:XX:XX A2=78:a0:XX:XX:XX:XX WPA: Nonce1 - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77 WPA: Nonce2 - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f4 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 enp10s0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): c5 c2 42 28 e0 a1 43 76 f5 13 a2 ec 31 37 55 65 EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) l2_packet_receive: src=78:a0:XX:XX:XX:XX len=121 enp10s0: RX EAPOL from 78:a0:XX:XX:XX:XX enp10s0: IEEE 802.1X RX: version=2 type=3 length=117 enp10s0: EAPOL-Key type=2 enp10s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) enp10s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f5 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 enp10s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE enp10s0: WPA: RX message 1 of 4-Way Handshake from 78:a0:XX:XX:XX:XX (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a RSN: PMKID from Authenticator - hexdump(len=16): 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a enp10s0: RSN: no matching PMKID found WPA: PTK derivation - A1=c4:e9:XX:XX:XX:XX A2=78:a0:XX:XX:XX:XX WPA: Nonce1 - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77 WPA: Nonce2 - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f5 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 enp10s0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): f8 a0 b6 74 b9 d1 de cc 02 d9 cb 12 53 fc 2b 37 l2_packet_receive: src=78:a0:XX:XX:XX:XX len=121 enp10s0: RX EAPOL from 78:a0:XX:XX:XX:XX enp10s0: IEEE 802.1X RX: version=2 type=3 length=117 enp10s0: EAPOL-Key type=2 enp10s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) enp10s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f6 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 enp10s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE enp10s0: WPA: RX message 1 of 4-Way Handshake from 78:a0:XX:XX:XX:XX (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a RSN: PMKID from Authenticator - hexdump(len=16): 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a enp10s0: RSN: no matching PMKID found WPA: PTK derivation - A1=c4:e9:XX:XX:XX:XX A2=78:a0:XX:XX:XX:XX WPA: Nonce1 - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77 WPA: Nonce2 - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f6 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 enp10s0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 70 6f 35 67 38 16 8b 15 82 d2 fa 5d 00 b2 31 45 l2_packet_receive: src=78:a0:XX:XX:XX:XX len=121 enp10s0: RX EAPOL from 78:a0:XX:XX:XX:XX enp10s0: IEEE 802.1X RX: version=2 type=3 length=117 enp10s0: EAPOL-Key type=2 enp10s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) enp10s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f7 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 enp10s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE enp10s0: WPA: RX message 1 of 4-Way Handshake from 78:a0:XX:XX:XX:XX (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a RSN: PMKID from Authenticator - hexdump(len=16): 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a enp10s0: RSN: no matching PMKID found WPA: PTK derivation - A1=c4:e9:XX:XX:XX:XX A2=78:a0:XX:XX:XX:XX WPA: Nonce1 - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77 WPA: Nonce2 - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f7 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 enp10s0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 27 fa b4 f3 3b b5 16 9d ba 59 56 ed 47 ba e7 c4 enp10s0: Authentication with 78:a0:XX:XX:XX:XX timed out. Added BSSID 78:a0:XX:XX:XX:XX into blacklist TDLS: Remove peers on disassociation enp10s0: WPA: Clear old PMK and PTK enp10s0: Request to deauthenticate - bssid=78:a0:XX:XX:XX:XX pending_bssid=00:00:00:00:00:00 reason=3 state=4WAY_HANDSHAKE TDLS: Tear down peers wpa_driver_wext_deauthenticate enp10s0: Event DEAUTH (12) received enp10s0: Deauthentication notification enp10s0: * reason 3 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] enp10s0: CTRL-EVENT-DISCONNECTED bssid=78:a0:XX:XX:XX:XX reason=3 locally_generated=1 enp10s0: WPA: 4-Way Handshake failed - pre-shared key may be incorrect enp10s0: CTRL-EVENT-SSID-TEMP-DISABLED id=1 ssid="ChateauXXXXX" auth_failures=1 duration=10 reason=WRONG_KEY enp10s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=7) enp10s0: Setting scan request: 0.100000 sec enp10s0: Radio work 'connect'@0x55c37e2c9fe0 done in 10.591082 seconds BSSID 78:a0:XX:XX:XX:XX blacklist count incremented to 2 enp10s0: Blacklist count 2 --> request scan in 500 ms enp10s0: Ignore new scan request for 0.500000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation enp10s0: WPA: Clear old PMK and PTK enp10s0: Disconnect event - remove keys enp10s0: State: 4WAY_HANDSHAKE -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 enp10s0: State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 enp10s0: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=48 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 00:00:00:00:00:00 enp10s0: Event DISASSOC (1) received enp10s0: Disassociation notification enp10s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0) enp10s0: Do not request new immediate scan TDLS: Remove peers on disassociation enp10s0: WPA: Clear old PMK and PTK enp10s0: Disconnect event - remove keys enp10s0: State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event enp10s0: State: DISCONNECTED -> SCANNING enp10s0: Starting AP scan for wildcard SSID enp10s0: Add radio work 'scan'@0x55c37e2c9fe0 enp10s0: First radio work item in the queue - schedule start immediately enp10s0: Starting radio work 'scan'@0x55c37e2c9fe0 after 0.000081 second wait Scan requested (ret=0) - scan timeout 10 seconds enp10s0: Removing interface enp10s0 enp10s0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=SCANNING TDLS: Tear down peers enp10s0: State: SCANNING -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wpa_driver_wext_set_countermeasures enp10s0: WPA: Clear old PMK and PTK Removed BSSID 78:a0:XX:XX:XX:XX from blacklist (clear) enp10s0: BSS: Remove id 0 BSSID 78:a0:XX:XX:XX:XX SSID 'ChateauXXXXX' due to wpa_bss_flush enp10s0: BSS: Remove id 1 BSSID 90:e3:XX:XX:XX:XX SSID 'ChateauXXXXX' due to wpa_bss_flush enp10s0: BSS: Remove id 2 BSSID 04:bd:88:XX:XX:XX SSID 'XXXXXX' due to wpa_bss_flush enp10s0: BSS: Remove id 3 BSSID 04:bd:88:XX:XX:XX SSID 'XXXXXX' due to wpa_bss_flush enp10s0: Cancelling scan request enp10s0: Cancelling authentication timeout Remove interface enp10s0 from radio enp10s0: Remove radio work 'scan'@0x55c37e2c9fe0 (started) Remove radio netlink: Operstate: ifindex=5 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) enp10s0: CTRL-EVENT-TERMINATING ProblemType: Bug DistroRelease: Ubuntu 16.04 Package: bcmwl-kernel-source 6.30.223.248+bdcom-0ubuntu8 ProcVersionSignature: Ubuntu 4.4.0-18.34-generic 4.4.6 Uname: Linux 4.4.0-18-generic x86_64 NonfreeKernelModules: nvidia_uvm nvidia_modeset nvidia wl ApportVersion: 2.20.1-0ubuntu2 Architecture: amd64 Date: Tue Apr 19 22:38:11 2016 EcryptfsInUse: Yes InstallationDate: Installed on 2014-05-25 (694 days ago) InstallationMedia: Ubuntu 14.04 LTS "Trusty Tahr" - Release amd64 (20140417) ProcEnviron: LANGUAGE=en_AU:en TERM=xterm PATH=(custom, no user) LANG=en_AU.UTF-8 SHELL=/bin/bash SourcePackage: bcmwl UpgradeStatus: Upgraded to xenial on 2016-04-10 (9 days ago) ** Affects: bcmwl (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug xenial -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to bcmwl in Ubuntu. https://bugs.launchpad.net/bugs/1572131 Title: wifi woefully poor connection speeds Status in bcmwl package in Ubuntu: New Bug description: wifi woefully poor connection speeds (6Mbps - 70Mbps - flakey at the top end)when compared to windows 270-300Mbps, slow but steady. I've even resorted to attempting to use ndiswrapper which loads the drivers and even appears to get the card going, however despite wpa_supplicant installed and everything set up ok, the connections to my routers fail (they negotiate wpa fine). So back to trying to get these bcmwl kernel drivers working again. I got the card on a quick Google search for a wifi AC card with linux support. I saw broadcom had drivers for it, so I bought it a few months ago. Its been a pain ever since. Anyway, per https://help.ubuntu.com/community/WifiDocs/Driver/bcm43xx There is some data attached to this bug report I'm sure, however to assist I'll post the extra terminal content and some of the ndiswrapper stuff as it might help as a comparison: ________________________ lspci -vvnn | grep -A 9 Network lsb_release -rd uname -a sudo dmidecode -s bios-version sudo dmidecode -s bios-release-date ________________________ Respectively: ________________________ 0a:00.0 Network controller [0280]: Broadcom Corporation BCM4360 802.11ac Wireless Network Adapter [14e4:43a0] (rev 03) Subsystem: Broadcom Corporation BCM4360 802.11ac Wireless Network Adapter [14e4:0619] Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR+ FastB2B- DisINTx- Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- <TAbort- <MAbort- >SERR- <PERR- INTx- Latency: 0, Cache Line Size: 32 bytes Interrupt: pin A routed to IRQ 19 Region 0: Memory at f7ef8000 (64-bit, non-prefetchable) [size=32K] Region 2: Memory at f7c00000 (64-bit, non-prefetchable) [size=2M] Capabilities: <access denied> Kernel driver in use: wl Kernel modules: bcma, wl Description: Ubuntu 16.04 LTS Release: 16.04 Linux HerculesLinux 4.4.0-18-generic #34-Ubuntu SMP Wed Apr 6 14:01:02 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux 1703 06/26/2012 ________________________ ok - so ndiswrapper attempted workaround using bcmwl5.inf bcmwl564.sys 14E4:43A0.5.conf ________________________ $ sudo rmmod wl $ sudo rmmod cfg80211 $ sudo modprobe ndiswrapper dmesg: [ 8719.640644] ndiswrapper version 1.59 loaded (smp=yes, preempt=no) [ 8719.874630] ndiswrapper: driver bcmwl5 (TP-LINK,11/07/2013, 6.30.223.201) loaded [ 8719.894483] ndiswrapper: using IRQ 19 [ 8720.125536] wlan0: ethernet device c4:e9:84:96:11:2a using NDIS driver: bcmwl5, version: 0x61edfc9, NDIS version: 0x501, vendor: 'NDIS Network Adapter', 14E4:43A0.5.conf [ 8720.126460] wlan0: encryption modes supported: WEP; TKIP with WPA, WPA2, WPA2-PSK; AES/CCMP with WPA, WPA2, WPA2-PSK [ 8720.126870] ndiswrapper 0000:0a:00.0 enp10s0: renamed from wlan0 [ 8720.134408] usbcore: registered new interface driver ndiswrapper [ 8720.143260] ndiswrapper: interface renamed to 'enp10s0' [ 8720.177929] cfg80211: World regulatory domain updated: [ 8720.177932] cfg80211: DFS Master region: unset [ 8720.177933] cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp), (dfs_cac_time) [ 8720.177935] cfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A) [ 8720.177936] cfg80211: (2457000 KHz - 2482000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A) [ 8720.177937] cfg80211: (2474000 KHz - 2494000 KHz @ 20000 KHz), (N/A, 2000 mBm), (N/A) [ 8720.177939] cfg80211: (5170000 KHz - 5250000 KHz @ 80000 KHz, 160000 KHz AUTO), (N/A, 2000 mBm), (N/A) [ 8720.177940] cfg80211: (5250000 KHz - 5330000 KHz @ 80000 KHz, 160000 KHz AUTO), (N/A, 2000 mBm), (0 s) [ 8720.177942] cfg80211: (5490000 KHz - 5730000 KHz @ 160000 KHz), (N/A, 2000 mBm), (0 s) [ 8720.177943] cfg80211: (5735000 KHz - 5835000 KHz @ 80000 KHz), (N/A, 2000 mBm), (N/A) [ 8720.177944] cfg80211: (57240000 KHz - 63720000 KHz @ 2160000 KHz), (N/A, 0 mBm), (N/A) ________________________ sudo wpa_supplicant -D wext -i enp10s0 -c/etc/wpa_supplicant.conf -d > wpa_supplicant_output.txt ________________________ wpa_supplicant v2.4 random: Trying to read entropy from /dev/random Successfully initialized wpa_supplicant Initializing interface 'enp10s0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' Reading configuration file '/etc/wpa_supplicant.conf' Priority group 3 id=2 ssid='ChateauXXXXX' Priority group 2 id=1 ssid='ChateauXXXXX' Priority group 1 id=0 ssid='ChateauXXXXX' SIOCGIWRANGE: WE(compiled)=22 WE(source)=19 enc_capa=0xf capabilities: key_mgmt 0xf enc 0x1f flags 0x0 netlink: Operstate: ifindex=5 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT) Add interface enp10s0 to a new radio N/A enp10s0: Own MAC address: c4:e9:XX:XX:XX:XX wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0 ioctl[SIOCSIWENCODEEXT]: Invalid argument Driver did not support SIOCSIWENCODEEXT wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0 ioctl[SIOCSIWENCODEEXT]: Invalid argument Driver did not support SIOCSIWENCODEEXT wpa_driver_wext_set_countermeasures enp10s0: RSN: flushing PMKID list in the driver enp10s0: Setting scan request: 0.100000 sec TDLS: TDLS operation not supported by driver TDLS: Driver uses internal link setup TDLS: Driver does not support TDLS channel switching enp10s0: WPS: UUID based on MAC address: e53fbfbc-e5a2-XXXX-XXXX-XXXXXXXXXXXX ENGINE: Loading dynamic engine ENGINE: Loading dynamic engine EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED enp10s0: Added interface enp10s0 enp10s0: State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) random: Got 20/20 bytes from /dev/random RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=48 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event enp10s0: State: DISCONNECTED -> SCANNING enp10s0: Starting AP scan for wildcard SSID enp10s0: Add radio work 'scan'@0x55c37e2c9fe0 enp10s0: First radio work item in the queue - schedule start immediately enp10s0: Starting radio work 'scan'@0x55c37e2c9fe0 after 0.000072 second wait Scan requested (ret=0) - scan timeout 10 seconds EAPOL: disable timer tick Ignore event for foreign ifindex 3 Scan timeout - try to get results enp10s0: Event SCAN_RESULTS (3) received Received 2691 bytes of scan results (4 BSSes) enp10s0: BSS: Start scan result update 1 enp10s0: BSS: Add new id 0 BSSID 78:a0:XX:XX:XX:XX SSID 'ChateauXXXXX' enp10s0: BSS: Add new id 1 BSSID 90:e3:XX:XX:XX:XX SSID 'ChateauXXXXX' enp10s0: BSS: Add new id 2 BSSID 04:bd:88:XX:XX:XX SSID 'XXXXXX' enp10s0: BSS: Add new id 3 BSSID 04:bd:88:XX:XX:XX SSID 'XXXXXX' BSS: last_scan_res_used=4/32 enp10s0: New scan results available (own=0 ext=0) WPS: AP 78:a0:XX:XX:XX:XX type 0 added WPS: AP 90:e3:XX:XX:XX:XX type 0 added WPS: AP[0] 78:a0:XX:XX:XX:XX type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] 90:e3:XX:XX:XX:XX type=0 tries=0 last_attempt=-1 sec ago blacklist=0 enp10s0: Radio work 'scan'@0x55c37e2c9fe0 done in 10.002111 seconds enp10s0: Selecting BSS from priority group 3 enp10s0: 0: 78:a0:XX:XX:XX:XX ssid='ChateauXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-61 wps enp10s0: skip - BSSID mismatch enp10s0: 1: 90:e3:XX:XX:XX:XX ssid='ChateauXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-73 wps enp10s0: skip - BSSID mismatch enp10s0: 2: 04:bd:88:XX:XX:XX ssid='XXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-74 enp10s0: skip - SSID mismatch enp10s0: 3: 04:bd:88:XX:XX:XX ssid='XXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-77 enp10s0: skip - SSID mismatch enp10s0: Selecting BSS from priority group 2 enp10s0: 0: 78:a0:XX:XX:XX:XX ssid='ChateauXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-61 wps enp10s0: skip - BSSID mismatch enp10s0: 1: 90:e3:XX:XX:XX:XX ssid='ChateauXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-73 wps enp10s0: selected based on RSN IE enp10s0: selected BSS 90:e3:XX:XX:XX:XX ssid='ChateauXXXXX' enp10s0: Considering connect request: reassociate: 0 selected: 90:e3:XX:XX:XX:XX bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x55c37e2ac420 current_ssid=(nil) enp10s0: Request association with 90:e3:XX:XX:XX:XX WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=15): 00 0d 43 68 61 74 65 61 75 42 75 6c 6c 6f 77 WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 03 01 09 WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 2a 01 00 WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=24): 3d 16 09 0f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: WMM Parameter Element - hexdump(len=24): 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 TDLS: TDLS is allowed in the target BSS TDLS: TDLS channel switch allowed in the target BSS enp10s0: Add radio work 'connect'@0x55c37e2c9fe0 enp10s0: First radio work item in the queue - schedule start immediately enp10s0: Starting radio work 'connect'@0x55c37e2c9fe0 after 0.000084 second wait enp10s0: Trying to associate with 90:e3:XX:XX:XX:XX (SSID='ChateauXXXXX' freq=2452 MHz) FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): enp10s0: Cancelling scan request enp10s0: WPA: clearing own WPA/RSN IE enp10s0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=0x55c37e2ac420 try_opportunistic=0 RSN: Search for BSSID 90:e3:XX:XX:XX:XX RSN: No PMKSA cache entry found enp10s0: RSN: using IEEE 802.11i/D9.0 enp10s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 enp10s0: WPA: Selected mgmt group cipher 32 enp10s0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 enp10s0: WPA: using GTK CCMP enp10s0: WPA: using PTK CCMP enp10s0: WPA: using KEY_MGMT WPA-PSK enp10s0: WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 enp10s0: State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) Limit connection to BSSID 90:e3:XX:XX:XX:XX freq=2452 MHz based on scan results (bssid_set=1) enp10s0: set_disable_max_amsdu: -1 enp10s0: set_ampdu_factor: -1 enp10s0: set_ampdu_density: -1 enp10s0: set_disable_ht40: 0 enp10s0: set_disable_sgi: 0 enp10s0: set_disable_ldpc: 0 enp10s0: Determining shared radio frequencies (max len 1) enp10s0: Shared frequencies (len=0): completed iteration wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk enp10s0: Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b04 len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=29 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 78:a0:XX:XX:XX:XX enp10s0: Event ASSOC (0) received enp10s0: State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) enp10s0: Associated to a new BSS: BSSID=78:a0:XX:XX:XX:XX enp10s0: Associated with 78:a0:XX:XX:XX:XX enp10s0: WPA: Association event - clear replay counter enp10s0: WPA: Clear old PTK TDLS: Remove peers on association EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE enp10s0: Setting authentication timeout: 10 sec 0 usec enp10s0: Cancelling scan request l2_packet_receive: src=78:a0:XX:XX:XX:XX len=121 enp10s0: RX EAPOL from 78:a0:XX:XX:XX:XX enp10s0: Setting authentication timeout: 10 sec 0 usec enp10s0: IEEE 802.1X RX: version=2 type=3 length=117 enp10s0: EAPOL-Key type=2 enp10s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) enp10s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f3 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 enp10s0: State: ASSOCIATED -> 4WAY_HANDSHAKE enp10s0: WPA: RX message 1 of 4-Way Handshake from 78:a0:XX:XX:XX:XX (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a RSN: PMKID from Authenticator - hexdump(len=16): 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a enp10s0: RSN: no matching PMKID found WPA: Renewed SNonce - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77 WPA: PTK derivation - A1=c4:e9:XX:XX:XX:XX A2=78:a0:XX:XX:XX:XX WPA: Nonce1 - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77 WPA: Nonce2 - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f3 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 enp10s0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 9f 49 2f 79 22 44 57 d6 3f f8 29 2b 44 e4 3f a3 l2_packet_receive: src=78:a0:XX:XX:XX:XX len=121 enp10s0: RX EAPOL from 78:a0:XX:XX:XX:XX enp10s0: IEEE 802.1X RX: version=2 type=3 length=117 enp10s0: EAPOL-Key type=2 enp10s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) enp10s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f4 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 enp10s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE enp10s0: WPA: RX message 1 of 4-Way Handshake from 78:a0:XX:XX:XX:XX (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a RSN: PMKID from Authenticator - hexdump(len=16): 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a enp10s0: RSN: no matching PMKID found WPA: PTK derivation - A1=c4:e9:XX:XX:XX:XX A2=78:a0:XX:XX:XX:XX WPA: Nonce1 - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77 WPA: Nonce2 - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f4 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 enp10s0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): c5 c2 42 28 e0 a1 43 76 f5 13 a2 ec 31 37 55 65 EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) l2_packet_receive: src=78:a0:XX:XX:XX:XX len=121 enp10s0: RX EAPOL from 78:a0:XX:XX:XX:XX enp10s0: IEEE 802.1X RX: version=2 type=3 length=117 enp10s0: EAPOL-Key type=2 enp10s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) enp10s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f5 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 enp10s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE enp10s0: WPA: RX message 1 of 4-Way Handshake from 78:a0:XX:XX:XX:XX (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a RSN: PMKID from Authenticator - hexdump(len=16): 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a enp10s0: RSN: no matching PMKID found WPA: PTK derivation - A1=c4:e9:XX:XX:XX:XX A2=78:a0:XX:XX:XX:XX WPA: Nonce1 - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77 WPA: Nonce2 - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f5 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 enp10s0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): f8 a0 b6 74 b9 d1 de cc 02 d9 cb 12 53 fc 2b 37 l2_packet_receive: src=78:a0:XX:XX:XX:XX len=121 enp10s0: RX EAPOL from 78:a0:XX:XX:XX:XX enp10s0: IEEE 802.1X RX: version=2 type=3 length=117 enp10s0: EAPOL-Key type=2 enp10s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) enp10s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f6 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 enp10s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE enp10s0: WPA: RX message 1 of 4-Way Handshake from 78:a0:XX:XX:XX:XX (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a RSN: PMKID from Authenticator - hexdump(len=16): 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a enp10s0: RSN: no matching PMKID found WPA: PTK derivation - A1=c4:e9:XX:XX:XX:XX A2=78:a0:XX:XX:XX:XX WPA: Nonce1 - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77 WPA: Nonce2 - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f6 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 enp10s0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 70 6f 35 67 38 16 8b 15 82 d2 fa 5d 00 b2 31 45 l2_packet_receive: src=78:a0:XX:XX:XX:XX len=121 enp10s0: RX EAPOL from 78:a0:XX:XX:XX:XX enp10s0: IEEE 802.1X RX: version=2 type=3 length=117 enp10s0: EAPOL-Key type=2 enp10s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) enp10s0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f7 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 enp10s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE enp10s0: WPA: RX message 1 of 4-Way Handshake from 78:a0:XX:XX:XX:XX (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a RSN: PMKID from Authenticator - hexdump(len=16): 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a enp10s0: RSN: no matching PMKID found WPA: PTK derivation - A1=c4:e9:XX:XX:XX:XX A2=78:a0:XX:XX:XX:XX WPA: Nonce1 - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77 WPA: Nonce2 - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f7 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 enp10s0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 27 fa b4 f3 3b b5 16 9d ba 59 56 ed 47 ba e7 c4 enp10s0: Authentication with 78:a0:XX:XX:XX:XX timed out. Added BSSID 78:a0:XX:XX:XX:XX into blacklist TDLS: Remove peers on disassociation enp10s0: WPA: Clear old PMK and PTK enp10s0: Request to deauthenticate - bssid=78:a0:XX:XX:XX:XX pending_bssid=00:00:00:00:00:00 reason=3 state=4WAY_HANDSHAKE TDLS: Tear down peers wpa_driver_wext_deauthenticate enp10s0: Event DEAUTH (12) received enp10s0: Deauthentication notification enp10s0: * reason 3 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] enp10s0: CTRL-EVENT-DISCONNECTED bssid=78:a0:XX:XX:XX:XX reason=3 locally_generated=1 enp10s0: WPA: 4-Way Handshake failed - pre-shared key may be incorrect enp10s0: CTRL-EVENT-SSID-TEMP-DISABLED id=1 ssid="ChateauXXXXX" auth_failures=1 duration=10 reason=WRONG_KEY enp10s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=7) enp10s0: Setting scan request: 0.100000 sec enp10s0: Radio work 'connect'@0x55c37e2c9fe0 done in 10.591082 seconds BSSID 78:a0:XX:XX:XX:XX blacklist count incremented to 2 enp10s0: Blacklist count 2 --> request scan in 500 ms enp10s0: Ignore new scan request for 0.500000 sec since an earlier request is scheduled to trigger sooner TDLS: Remove peers on disassociation enp10s0: WPA: Clear old PMK and PTK enp10s0: Disconnect event - remove keys enp10s0: State: 4WAY_HANDSHAKE -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 enp10s0: State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 enp10s0: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=48 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 00:00:00:00:00:00 enp10s0: Event DISASSOC (1) received enp10s0: Disassociation notification enp10s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0) enp10s0: Do not request new immediate scan TDLS: Remove peers on disassociation enp10s0: WPA: Clear old PMK and PTK enp10s0: Disconnect event - remove keys enp10s0: State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added WEXT: if_removed already cleared - ignore event enp10s0: State: DISCONNECTED -> SCANNING enp10s0: Starting AP scan for wildcard SSID enp10s0: Add radio work 'scan'@0x55c37e2c9fe0 enp10s0: First radio work item in the queue - schedule start immediately enp10s0: Starting radio work 'scan'@0x55c37e2c9fe0 after 0.000081 second wait Scan requested (ret=0) - scan timeout 10 seconds enp10s0: Removing interface enp10s0 enp10s0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=SCANNING TDLS: Tear down peers enp10s0: State: SCANNING -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wpa_driver_wext_set_countermeasures enp10s0: WPA: Clear old PMK and PTK Removed BSSID 78:a0:XX:XX:XX:XX from blacklist (clear) enp10s0: BSS: Remove id 0 BSSID 78:a0:XX:XX:XX:XX SSID 'ChateauXXXXX' due to wpa_bss_flush enp10s0: BSS: Remove id 1 BSSID 90:e3:XX:XX:XX:XX SSID 'ChateauXXXXX' due to wpa_bss_flush enp10s0: BSS: Remove id 2 BSSID 04:bd:88:XX:XX:XX SSID 'XXXXXX' due to wpa_bss_flush enp10s0: BSS: Remove id 3 BSSID 04:bd:88:XX:XX:XX SSID 'XXXXXX' due to wpa_bss_flush enp10s0: Cancelling scan request enp10s0: Cancelling authentication timeout Remove interface enp10s0 from radio enp10s0: Remove radio work 'scan'@0x55c37e2c9fe0 (started) Remove radio netlink: Operstate: ifindex=5 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) enp10s0: CTRL-EVENT-TERMINATING ProblemType: Bug DistroRelease: Ubuntu 16.04 Package: bcmwl-kernel-source 6.30.223.248+bdcom-0ubuntu8 ProcVersionSignature: Ubuntu 4.4.0-18.34-generic 4.4.6 Uname: Linux 4.4.0-18-generic x86_64 NonfreeKernelModules: nvidia_uvm nvidia_modeset nvidia wl ApportVersion: 2.20.1-0ubuntu2 Architecture: amd64 Date: Tue Apr 19 22:38:11 2016 EcryptfsInUse: Yes InstallationDate: Installed on 2014-05-25 (694 days ago) InstallationMedia: Ubuntu 14.04 LTS "Trusty Tahr" - Release amd64 (20140417) ProcEnviron: LANGUAGE=en_AU:en TERM=xterm PATH=(custom, no user) LANG=en_AU.UTF-8 SHELL=/bin/bash SourcePackage: bcmwl UpgradeStatus: Upgraded to xenial on 2016-04-10 (9 days ago) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bcmwl/+bug/1572131/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp