wpa_supplicant and Wireless event: cmd=0x8b15
Raphael Bauduin
rblists
Tue Aug 23 10:44:42 PDT 2005
Hi,
I've got some strange problems with connecting to my wireless network
configured with a pre-shared key WPA. I have to restart wpa_supplicant several
times (ranges from 2 to 20+ times) before I can get an ip with dhclient. I've
had the opportunity to test it with windows clients and it works fine. My card
is a D-Link DWL-G520, and I'm using the madwifi drivers (snapshot from 2 weeks
ago), and my AP is a D-Link DSL-G604T. Linux kernel is 2.6.7.
Here's my network config in wpa_supplicant.conf:
network={
scan_ssid=0
proto=WPA
key_mgmt=WPA-PSK
pairwise=CCMP TKIP
#pairwise=TKIP
group=CCMP TKIP WEP104 WEP40
#group=TKIP WEP104 WEP40
ssid="RAPHINOU_HOME"
psk=****
}
When I start wpa_supplicant, here's the output:
************************* output start *******************************
Initializing interface 'ath0' conf '/etc/wpa_supplicant.conf' driver 'madwifi'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
eapol_version=1
ap_scan=0
fast_reauth=1
Line: 306 - start of a new network block
scan_ssid=0 (0x0)
proto: 0x1
key_mgmt: 0x2
pairwise: 0x18
group: 0x1e
ssid - hexdump_ascii(len=13):
52 41 50 48 49 4e 4f 55 5f 48 4f 4d 45 RAPHINOU_HOME
PSK - hexdump(len=32): [REMOVED]
Priority group 0
id=0 ssid='RAPHINOU_HOME'
Initializing interface (2) 'ath0'
Own MAC address: 00:0f:3d:af:2d:1a
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_set_countermeasures: enabled=0
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
Setting scan request: 0 sec 100000 usec
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Already associated with a configured network - generating associated event
Association event - clear replay counter
Associated with 00:00:00:00:00:00
Setting authentication timeout: 10 sec 0 usec
Wireless event: cmd=0x8b19 len=12
Received 275 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:0f:3d:b3:ea:24 ssid='RAPHINOU_HOME' wpa_ie_len=24 rsn_ie_len=0
selected
Trying to associate with 00:0f:3d:b3:ea:24 (SSID='RAPHINOU_HOME' freq=2437 MHz)
Cancelling scan request
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
wpa_driver_madwifi_associate
Setting authentication timeout: 5 sec 0 usec
Wireless event: cmd=0x8b1a len=26
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0f:3d:b3:ea:24
Association event - clear replay counter
Associated to a new BSS: BSSID=00:0f:3d:b3:ea:24
No keys have been configured - skip key clearing
Network configuration found for the current AP
WPA: Using WPA IE from AssocReq to set cipher suites
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
Associated with 00:0f:3d:b3:ea:24
Setting authentication timeout: 10 sec 0 usec
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RX EAPOL from 00:0f:3d:b3:ea:24
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00
00 00 01 b8 16 a9 df f7 ce 01 84 16 e1 2a be 3e 37 ac6e 69 f4 ac 15 4c
1b 6a 6c 31 3c 1f a9 1e 25 2c d5 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00
00 00 00 00 00 01 b8 16 a9 df f7 ce 01 84 16 e1 2a be3e 37 ac 6e 69 f4
ac 15 4c 1b 6a 6c 31 3c 1f a9 1e 25 2c d5 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:0f:3d:b3:ea:24 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): c8 60 13 38 07 e9 47 db 1c 22
04 5b 37 26 b7 1c 45 c8 a9 b6 d7 43 74 6e ed eb 75 5c 3a f8 8b 9e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): 96 44 e9 72 f8 3b f4 87 e5 43 70
39 cf 4c b8 c2
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 0f 3d b3 ea 24 00 0f 3d
af 2d 1a 88 8e 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 c8
60 13 38 07 e9 47 db 1c 22 04 5b 37 26 b7 1c 45 c8 a9 b6 d7 43 74 6e
ed eb 75 5c 3a f8 8b 9e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 96 44 e9 72 f8 3b
f4 87 e5 43 70 39 cf 4c b8c2 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:0f:3d:b3:ea:24
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00
00 00 02 b8 16 a9 df f7 ce 01 84 16 e1 2a be 3e 37 ac 6e 69 f4 ac 15
4c 1b 6a 6c 31 3c 1f a9 1e 25 2c d5 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00 00 00 00 00 10 2d f9
7f cf eb e6 83 04 c1 6a a0 aa 7c fe 3d 00 18 dd 16 00 50 f2 01 01 00
00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00
00 00 00 00 00 02 b8 16 a9 df f7 ce 01 84 16 e1 2a be 3e 37 ac 6e 69
f4 ac 15 4c 1b 6a 6c 31 3c 1f a9 1e 25 2c d5 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00 00 00 00 00 00 00 00
10 2d f9 7f cf eb e6 83 04 c1 6a a0 aa 7c fe 3d 00 18 dd 16 00 50 f2
01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: RX message 3 of 4-Way Handshake from 00:0f:3d:b3:ea:24 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: No WPA/RSN IE for this AP known. Trying to get from scan results
WPA: Found the current AP from updated scan results
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key 4/4 - hexdump(len=113): 00 0f 3d b3 ea 24 00 0f 3d
af 2d 1a 88 8e 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 c8
60 13 38 07 e9 47 db 1c 22 04 5b 37 26 b7 1c 45 c8 a9 b6 d7 43 74 6e
ed eb 75 5c 3a f8 8b 9e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 f7 ab 1b 52 e9
c0 a6 ef c3 a3 79 af cc 3aa3 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_madwifi_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 key_len=32
Wireless event: cmd=0x8c02 len=81
Custom wireless event: 'MLME-REPLAYFAILURE.indication(keyid=4 unicast
addr=00:0f:3d:af:2d:1a)'
RX EAPOL from 00:0f:3d:b3:ea:24
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00
00 00 04 b8 16 a9 df f7 ce 01 84 16 e1 2a be 3e 37 ac 6e 69 f4 ac 15
4c 1b 6a 6c 31 3c 1f a9 1e 25 2c d4 69 f4 ac 15 4c 1b 6a 6c 31 3c 1f
a9 1e 25 2c d6 00 00 00 00 00 00 00 0000 00 00 00 00 00 00 00 38 e5 69
46 86 b4 d9 e2 57 d2 7a 09 38 ea 6e 40 00 20 9a 8e 02 3f 0f 24 e0 4c
9f 51 b5 fc 73 29 5c e1 50 6c c0 8b 60 6f 42 a9 ea 04 d5 d1 52 db 34
11
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00
00 00 00 00 00 04 b8 16 a9 df f7 ce 01 84 16 e1 2a be 3e 37 ac 6e 69
f4 ac 15 4c 1b 6a 6c 31 3c 1f a9 1e 25 2c d4 69 f4 ac 15 4c 1b 6a 6c
31 3c 1f a9 1e 25 2c d6 00 00 00 00 0000 00 00 00 00 00 00 00 00 00 00
38 e5 69 46 86 b4 d9 e2 57 d2 7a 09 38 ea 6e 40 00 20 9a 8e 02 3f 0f
24 e0 4c 9f 51 b5 fc 73 29 5c e1 50 6c c0 8b 60 6f 42 a9 ea 04 d5 d1
52 db 34 11
WPA: RX message 1 of Group Key Handshake from 00:0f:3d:b3:ea:24 (ver=1)
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_madwifi_set_key: alg=TKIP key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 0f 3d b3 ea 24 00 0f 3d
af 2d 1a 88 8e 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 04 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 4c 10 b9 78 3a
7a 93 04 59 d9 d5 84 f0 d302 00 00
WPA: Key negotiation completed with 00:0f:3d:b3:ea:24 [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
************************* output end *******************************
When I can't connect to the network, I see wpa_supplicant add my AP to
its blacklist.... Here's the output wpa_supplicant gives when I run
dhclient ath0:
************************* output start *******************************
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:0f:3d:b3:ea:24 into blacklist
Disconnect event - remove keys
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
l2_packet_receive - recv: Network is down
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Already associated with a configured network - generating associated event
Association event - clear replay counter
Associated with 00:00:00:00:00:00
Setting authentication timeout: 10 sec 0 usec
************************* output end *******************************
And just today I have this event
Wireless event: cmd=0x8b15 len=20
that, after being logged, breaks my connection. Here'are the lines
that were appended to the wpa_suplicant logs when the connection got
broken (the ping to the AP stops working when these lines appear in
the logs):
************************* output start *******************************
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:0f:3d:b3:ea:24 into blacklist
Disconnect event - remove keys
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Already associated with a configured network - generating associated event
Association event - clear replay counter
Associated with 00:00:00:00:00:00
Setting authentication timeout: 10 sec 0 usec
************************* output end *******************************
Subsequent questions:
- what's that even cmd=0x8b15 len=20?
- it associated with BSSIS 00:00:00:00:00:00. What's the meaning of this?
- why adding my AP's bssid to the blacklist?
- why once it succedded, do all subsequent attempts succeed too?
- why does it say "Already associated with a configured network"? To
which network?
Thanks
Raph
PS: I have also tested the version included in debian (0.4.2-1), but
here's the output I got. I didn't test much further with that version
though...
/usr/sbin/wpa_supplicant -i ath0 -dd -c /etc/wpa_supplicant.conf -D madwifi -w
Initializing interface 'ath0' conf '/etc/wpa_supplicant.conf' driver 'madwifi'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
eapol_version=1
ap_scan=0
fast_reauth=1
Line: 306 - start of a new network block
scan_ssid=0 (0x0)
proto: 0x1
key_mgmt: 0x2
pairwise: 0x18
group: 0x1e
ssid - hexdump_ascii(len=13):
52 41 50 48 49 4e 4f 55 5f 48 4f 4d 45 RAPHINOU_HOME
PSK - hexdump(len=32): [REMOVED]
Priority group 0
id=0 ssid='RAPHINOU_HOME'
Initializing interface (2) 'ath0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
ioctl[SIOCSIWPMKSA]: Operation not supported
Own MAC address: 00:0f:3d:af:2d:1a
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_set_countermeasures: enabled=0
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
Setting scan request: 0 sec 100000 usec
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Already associated with a configured network - generating associated event
State: DISCONNECTED -> ASSOCIATED
Associated with 00:00:00:00:00:00
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
BSSID not set when trying to send an EAPOL frame
Using the source address of the last received EAPOL frame
00:00:00:00:00:00 as the EAPOL destination
TX EAPOL - hexdump(len=18): 00 00 00 00 00 00 00 0f 3d af 2d 1a 88 8e
01 01 00 00
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Wireless event: cmd=0x8b19 len=12
Received 275 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:0f:3d:b3:ea:24 ssid='RAPHINOU_HOME' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
selected
Trying to associate with 00:0f:3d:b3:ea:24 (SSID='RAPHINOU_HOME' freq=2437 MHz)
Cancelling scan request
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
State: ASSOCIATED -> ASSOCIATING
wpa_driver_madwifi_associate
ioctl[IEEE80211_IOCTL_SETMLME]: Argument list too long
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=26
Authentication with 00:00:00:00:00:00 timed out.
Added BSSID 00:00:00:00:00:00 into blacklist
State: ASSOCIATING -> DISCONNECTED
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
Already associated with a configured network - generating associated event
State: DISCONNECTED -> ASSOCIATED
Associated with 00:00:00:00:00:00
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Authentication with 00:00:00:00:00:00 timed out.
BSSID 00:00:00:00:00:00 blacklist count incremented to 2
State: ASSOCIATED -> DISCONNECTED
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
Already associated with a configured network - generating associated event
State: DISCONNECTED -> ASSOCIATED
Associated with 00:00:00:00:00:00
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Authentication with 00:00:00:00:00:00 timed out.
BSSID 00:00:00:00:00:00 blacklist count incremented to 3
State: ASSOCIATED -> DISCONNECTED
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
Already associated with a configured network - generating associated event
State: DISCONNECTED -> ASSOCIATED
Associated with 00:00:00:00:00:00
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
CTRL-EVENT-TERMINATING - signal 2 received
State: ASSOCIATED -> DISCONNECTED
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wpa_driver_madwifi_set_drop_unencrypted: enabled=0
wpa_driver_madwifi_set_countermeasures: enabled=0
No keys have been configured - skip key clearing
Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
More information about the Hostap
mailing list