Here’s an excerpt from the first log:
09:50:57 wpa_supplicant[823]: wlan0: WPA: Key negotiation completed with 06:0c:43:26:59:97 [PTK=CCMP GTK=CCMP]
09:50:57 wpa_supplicant[823]: wlan0: Removed BSSID 06:0c:43:26:59:97 from ignore list
09:50:57 wpa_supplicant[823]: wlan0: CTRL-EVENT-CONNECTED - Connection to 06:0c:43:26:59:97 completed [id=0 id_str=]
09:50:57 NetworkManager[775]: <info> [1766134257.8385] device (wlan0): supplicant interface state: 4way_handshake -> completed
09:50:57 NetworkManager[775]: <info> [1766134257.8387] device (wlan0): ip:dhcp4: restarting
09:50:57 NetworkManager[775]: <info> [1766134257.8505] dhcp4 (wlan0): canceled DHCP transaction
09:50:57 NetworkManager[775]: <info> [1766134257.8505] dhcp4 (wlan0): state changed no lease
09:50:57 NetworkManager[775]: <info> [1766134257.8506] dhcp4 (wlan0): activation: beginning transaction (timeout in 45 seconds)
09:50:57 NetworkManager[775]: <info> [1766134257.8508] device (p2p-dev-wlan0): supplicant management interface state: 4way_handshake -> completed
09:51:00 wpa_supplicant[823]: wlan0: CTRL-EVENT-SIGNAL-CHANGE above=0 signal=-82 noise=9999 txrate=720600
09:51:01 kernel: wlan0: deauthenticated from 06:0c:43:26:59:97 (Reason: 15=4WAY_HANDSHAKE_TIMEOUT)
Here’s some debugging enabled for another attempt:
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 126
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=2): 95 9d
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 127
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=2): 99 a1
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 128
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=8): 24 28 2c 30 95 99 9d a1
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 130
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=9): 24 28 2c 30 95 99 9d a1 a5
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 131
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=6): 05 15 25 35 45 55
11:45:53 wpa_supplicant[512389]: P2P: Update channel list
11:45:53 wpa_supplicant[512389]: P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:1>
11:45:53 wpa_supplicant[512389]: P2P: cli_channels:
11:45:53 wpa_supplicant[512389]: WPA: Renewed SNonce - hexdump(len=32): 6c ea b9 e5 0a 51 84 43 8d 64 9b 7a d3 fb 87 07 74 d3 fb 56 ca 3b bf 39 ef 44 93 f6 fd 4f 8c 56
11:45:53 wpa_supplicant[512389]: WPA: PTK derivation using PRF(SHA1)
11:45:53 wpa_supplicant[512389]: WPA: PTK derivation - A1=44:fa:66:57:9a:c9 A2=06:0c:43:26:59:97
11:45:53 wpa_supplicant[512389]: WPA: Nonce1 - hexdump(len=32): 6c ea b9 e5 0a 51 84 43 8d 64 9b 7a d3 fb 87 07 74 d3 fb 56 ca 3b bf 39 ef 44 93 f6 fd 4f 8c 56
11:45:53 wpa_supplicant[512389]: WPA: Nonce2 - hexdump(len=32): 66 04 5b 32 a5 9f e2 16 db aa 4b 07 6c f1 a0 4a 22 8b 0f d5 87 e8 6c bb 74 a9 7d cc 3a 5f 80 e2
11:45:53 wpa_supplicant[512389]: WPA: PMK - hexdump(len=32): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: PTK - hexdump(len=48): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: KCK - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: KEK - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: TK - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00
11:45:53 wpa_supplicant[512389]: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
11:45:53 wpa_supplicant[512389]: wlan0: WPA: Sending EAPOL-Key 2/4
11:45:53 wpa_supplicant[512389]: WPA: Send EAPOL-Key frame to 06:0c:43:26:59:97 ver=2 mic_len=16 key_mgmt=0x2
11:45:53 wpa_supplicant[512389]: WPA: EAPOL-Key MIC using HMAC-SHA1
11:45:53 wpa_supplicant[512389]: WPA: KCK - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: Derived Key MIC - hexdump(len=16): 5c cc 6f d8 e1 5d 3b d9 f8 bc 26 39 bf 3c 48 09
11:45:53 wpa_supplicant[512389]: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 6c ea b9 e5 0a 51 84 43 8d 64 9b 7a d3 fb 87 07 74 d3 fb>
11:45:53 wpa_supplicant[512389]: nl80211: Send over control port dest=06:0c:43:26:59:97 proto=0x888e len=121 no_encrypt=1
11:45:53 wpa_supplicant[512389]: nl80211: tx_control_port cookie=0xfaf
11:45:53 wpa_supplicant[512389]: nl80211: Event message available
11:45:53 wpa_supplicant[512389]: nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wlan0
11:45:53 wpa_supplicant[512389]: nl80211: Control port TX status (ack=1), cookie=4015
11:45:53 wpa_supplicant[512389]: wlan0: Event EAPOL_TX_STATUS (37) received
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0
11:45:53 NetworkManager[512502]: <info> [1766141153.7555] device (wlan0): supplicant interface state: associated -> 4way_handshake
11:45:53 NetworkManager[512502]: <info> [1766141153.7555] device (p2p-dev-wlan0): supplicant management interface state: associated -> 4way_handshake
11:45:53 wpa_supplicant[512389]: nl80211: Event message available
11:45:53 wpa_supplicant[512389]: nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wlan0
11:45:53 wpa_supplicant[512389]: wlan0: Event EAPOL_RX (23) received
11:45:53 wpa_supplicant[512389]: wlan0: RX EAPOL from 06:0c:43:26:59:97 (encrypted=0)
11:45:53 wpa_supplicant[512389]: RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 cd 54 bc e0 6d 80 cf e9 20 48 f1 08 37 b3 e5 7b 3e e8 95 2c 4a 52 >
11:45:53 wpa_supplicant[512389]: wlan0: IEEE 802.1X RX: version=2 type=3 length=95
11:45:53 wpa_supplicant[512389]: WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 cd 54 bc e0 6d 80 cf e9 20 48 f1 08 37 b3 e5 7b 3e e8 95 >
11:45:53 wpa_supplicant[512389]: wlan0: EAPOL-Key type=2
11:45:53 wpa_supplicant[512389]: wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
11:45:53 wpa_supplicant[512389]: wlan0: key_length=16 key_data_length=0
11:45:53 wpa_supplicant[512389]: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
11:45:53 wpa_supplicant[512389]: key_nonce - hexdump(len=32): cd 54 bc e0 6d 80 cf e9 20 48 f1 08 37 b3 e5 7b 3e e8 95 2c 4a 52 be 14 1a 5b fe 79 34 db 9d 7a
11:45:53 wpa_supplicant[512389]: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
11:45:53 wpa_supplicant[512389]: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
11:45:53 wpa_supplicant[512389]: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
11:45:53 wpa_supplicant[512389]: key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
11:45:53 wpa_supplicant[512389]: wlan0: WPA: RX message 1 of 4-Way Handshake from 06:0c:43:26:59:97 (ver=2)
11:45:53 wpa_supplicant[512389]: RSN: msg 1/4 key data - hexdump(len=0):
11:45:53 wpa_supplicant[512389]: wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
11:45:53 wpa_supplicant[512389]: WPA: PTK derivation using PRF(SHA1)
11:45:53 wpa_supplicant[512389]: WPA: PTK derivation - A1=44:fa:66:57:9a:c9 A2=06:0c:43:26:59:97
11:45:53 wpa_supplicant[512389]: WPA: Nonce1 - hexdump(len=32): 6c ea b9 e5 0a 51 84 43 8d 64 9b 7a d3 fb 87 07 74 d3 fb 56 ca 3b bf 39 ef 44 93 f6 fd 4f 8c 56
11:45:53 wpa_supplicant[512389]: WPA: Nonce2 - hexdump(len=32): cd 54 bc e0 6d 80 cf e9 20 48 f1 08 37 b3 e5 7b 3e e8 95 2c 4a 52 be 14 1a 5b fe 79 34 db 9d 7a
11:45:53 wpa_supplicant[512389]: WPA: PMK - hexdump(len=32): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: PTK - hexdump(len=48): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: KCK - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: KEK - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: TK - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00
11:45:53 wpa_supplicant[512389]: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
11:45:53 wpa_supplicant[512389]: wlan0: WPA: Sending EAPOL-Key 2/4
11:45:53 wpa_supplicant[512389]: WPA: Send EAPOL-Key frame to 06:0c:43:26:59:97 ver=2 mic_len=16 key_mgmt=0x2
11:45:53 wpa_supplicant[512389]: WPA: EAPOL-Key MIC using HMAC-SHA1
11:45:53 wpa_supplicant[512389]: WPA: KCK - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: Derived Key MIC - hexdump(len=16): 06 99 4e c0 a3 4c c6 b3 df 9a 90 5f f6 48 49 f6
11:45:53 wpa_supplicant[512389]: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 6c ea b9 e5 0a 51 84 43 8d 64 9b 7a d3 fb 87 07 74 d3 fb>
11:45:53 wpa_supplicant[512389]: nl80211: Send over control port dest=06:0c:43:26:59:97 proto=0x888e len=121 no_encrypt=1
11:45:53 wpa_supplicant[512389]: nl80211: tx_control_port cookie=0xfb0
11:45:53 wpa_supplicant[512389]: nl80211: Event message available
11:45:53 wpa_supplicant[512389]: nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wlan0
11:45:53 wpa_supplicant[512389]: nl80211: Control port TX status (ack=1), cookie=4016
11:45:53 wpa_supplicant[512389]: wlan0: Event EAPOL_TX_STATUS (37) received
11:45:53 wpa_supplicant[512389]: nl80211: Event message available
11:45:53 wpa_supplicant[512389]: nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wlan0
11:45:53 wpa_supplicant[512389]: wlan0: Event EAPOL_RX (23) received
11:45:53 wpa_supplicant[512389]: wlan0: RX EAPOL from 06:0c:43:26:59:97 (encrypted=0)
11:45:53 wpa_supplicant[512389]: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 cd 54 bc e0 6d 80 cf e9 20 48 f1 08 37 b3 e5 7b 3e e8 95 2c 4a 52>
11:45:53 wpa_supplicant[512389]: wlan0: IEEE 802.1X RX: version=2 type=3 length=151
11:45:53 wpa_supplicant[512389]: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 cd 54 bc e0 6d 80 cf e9 20 48 f1 08 37 b3 e5 7b 3e e8 95>
11:45:53 wpa_supplicant[512389]: wlan0: EAPOL-Key type=2
11:45:53 wpa_supplicant[512389]: wlan0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
11:45:53 wpa_supplicant[512389]: wlan0: key_length=16 key_data_length=56
11:45:53 wpa_supplicant[512389]: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
11:45:53 wpa_supplicant[512389]: key_nonce - hexdump(len=32): cd 54 bc e0 6d 80 cf e9 20 48 f1 08 37 b3 e5 7b 3e e8 95 2c 4a 52 be 14 1a 5b fe 79 34 db 9d 7a
11:45:53 wpa_supplicant[512389]: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
11:45:53 wpa_supplicant[512389]: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
11:45:53 wpa_supplicant[512389]: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
11:45:53 wpa_supplicant[512389]: key_mic - hexdump(len=16): 0a f2 9a a6 9c c3 fa d0 b3 67 9d a9 7f 88 e4 ab
11:45:53 wpa_supplicant[512389]: WPA: EAPOL-Key MIC using HMAC-SHA1
11:45:53 wpa_supplicant[512389]: RSN: encrypted key data - hexdump(len=56): 41 f9 44 3d 24 b6 c4 e5 aa 92 f0 ef 3c c5 53 83 02 93 c3 7c ce b7 4b 67 1e 1f 03 23 90 fb 4c a8 2f 4e >
11:45:53 wpa_supplicant[512389]: WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
11:45:53 wpa_supplicant[512389]: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
11:45:53 wpa_supplicant[512389]: wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
11:45:53 wpa_supplicant[512389]: wlan0: RSN: RX message 3 of 4-Way Handshake from 06:0c:43:26:59:97 (ver=2)
11:45:53 wpa_supplicant[512389]: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 d0 3b e3 4b 01 aa 5d>
11:45:53 wpa_supplicant[512389]: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
11:45:53 wpa_supplicant[512389]: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
11:45:53 wpa_supplicant[512389]: wlan0: WPA: Sending EAPOL-Key 4/4
11:45:53 wpa_supplicant[512389]: WPA: Send EAPOL-Key frame to 06:0c:43:26:59:97 ver=2 mic_len=16 key_mgmt=0x2
11:45:53 wpa_supplicant[512389]: WPA: EAPOL-Key MIC using HMAC-SHA1
11:45:53 wpa_supplicant[512389]: WPA: KCK - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: Derived Key MIC - hexdump(len=16): e7 a1 11 70 89 29 c3 d6 b3 05 2d 53 9a 00 fa b4
11:45:53 wpa_supplicant[512389]: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >
11:45:53 wpa_supplicant[512389]: nl80211: Send over control port dest=06:0c:43:26:59:97 proto=0x888e len=99 no_encrypt=1
11:45:53 wpa_supplicant[512389]: nl80211: tx_control_port cookie=0xfb1
11:45:53 wpa_supplicant[512389]: wlan0: WPA: Installing PTK to the driver
11:45:53 wpa_supplicant[512389]: wpa_driver_nl80211_set_key: ifindex=2 (wlan0) alg=3 addr=0x55d16db51920 key_idx=0 set_tx=1 seq_len=6 key_len=16 key_flag=0x2c link_id=-1
11:45:53 wpa_supplicant[512389]: nl80211: NEW_KEY
11:45:53 wpa_supplicant[512389]: nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
11:45:53 wpa_supplicant[512389]: addr=06:0c:43:26:59:97
11:45:53 wpa_supplicant[512389]: pairwise key
11:45:53 wpa_supplicant[512389]: EAPOL: External notification - portValid=1
11:45:53 wpa_supplicant[512389]: wlan0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
11:45:53 wpa_supplicant[512389]: wlan0: Determining shared radio frequencies (max len 2)
11:45:53 wpa_supplicant[512389]: wlan0: Shared frequencies (len=1): completed iteration
11:45:53 wpa_supplicant[512389]: wlan0: freq[0]: 5240, flags=0x1
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 81
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 115
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=4): 24 28 2c 30
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 116
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=2): 24 2c
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 117
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=2): 28 30
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 124
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=4): 95 99 9d a1
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 125
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 126
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=2): 95 9d
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 127
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=2): 99 a1
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 128
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=8): 24 28 2c 30 95 99 9d a1
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 130
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=9): 24 28 2c 30 95 99 9d a1 a5
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 131
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=6): 05 15 25 35 45 55
11:45:53 wpa_supplicant[512389]: P2P: Update channel list
11:45:53 wpa_supplicant[512389]: P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:1>
11:45:53 wpa_supplicant[512389]: P2P: cli_channels:
11:45:53 wpa_supplicant[512389]: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: Group Key - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: wlan0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16)
11:45:53 wpa_supplicant[512389]: WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
11:45:53 wpa_supplicant[512389]: wpa_driver_nl80211_set_key: ifindex=2 (wlan0) alg=3 addr=0x55d16b516885 key_idx=2 set_tx=0 seq_len=6 key_len=16 key_flag=0x14 link_id=-1
11:45:53 wpa_supplicant[512389]: nl80211: NEW_KEY
11:45:53 wpa_supplicant[512389]: nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
11:45:53 wpa_supplicant[512389]: broadcast key
11:45:53 wpa_supplicant[512389]: wlan0: WPA: Key negotiation completed with 06:0c:43:26:59:97 [PTK=CCMP GTK=CCMP]
11:45:53 wpa_supplicant[512389]: wlan0: Cancelling authentication timeout
11:45:53 wpa_supplicant[512389]: wlan0: Removed BSSID 06:0c:43:26:59:97 from ignore list
11:45:53 wpa_supplicant[512389]: wlan0: State: GROUP_HANDSHAKE -> COMPLETED
11:45:53 wpa_supplicant[512389]: wlan0: Radio work 'sme-connect'@0x55d16dbfce70 done in 0.460751 seconds
11:45:53 wpa_supplicant[512389]: wlan0: radio_work_free('sme-connect'@0x55d16dbfce70): num_active_works --> 0
11:45:53 wpa_supplicant[512389]: wlan0: CTRL-EVENT-CONNECTED - Connection to 06:0c:43:26:59:97 completed [id=0 id_str=]
11:45:53 wpa_supplicant[512389]: nl80211: Set wlan0 operstate 0->1 (UP)
11:45:53 wpa_supplicant[512389]: netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
11:45:53 wpa_supplicant[512389]: bgscan simple: Signal strength threshold -65 Short bgscan interval 30 Long bgscan interval 300
11:45:53 wpa_supplicant[512389]: nl80211: Signal monitor threshold=-65 hysteresis=4
11:45:53 wpa_supplicant[512389]: bgscan simple: Init scan interval: 30
11:45:53 wpa_supplicant[512389]: bgscan: Initialized module 'simple' with parameters '30:-65:300'
11:45:53 wpa_supplicant[512389]: nl80211: Received scan results (12 BSSes)
11:45:53 wpa_supplicant[512389]: nl80211: Scan results indicate BSS status with 06:0c:43:26:59:97 as associated
11:45:53 wpa_supplicant[512389]: wlan0: BSS: Start scan result update 35
11:45:53 wpa_supplicant[512389]: bgscan simple: scan result notification
11:45:53 wpa_supplicant[512389]: wlan0: Determining shared radio frequencies (max len 2)
11:45:53 wpa_supplicant[512389]: wlan0: Shared frequencies (len=1): completed iteration
11:45:53 wpa_supplicant[512389]: wlan0: freq[0]: 5240, flags=0x1
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 81
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 115
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=4): 24 28 2c 30
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 116
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=2): 24 2c
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 117
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=2): 28 30
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 124
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=4): 95 99 9d a1
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 125
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 126
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=2): 95 9d
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 127
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=2): 99 a1
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 128
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=8): 24 28 2c 30 95 99 9d a1
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 130
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=9): 24 28 2c 30 95 99 9d a1 a5
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 131
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=6): 05 15 25 35 45 55
11:45:53 wpa_supplicant[512389]: P2P: Update channel list
11:45:53 wpa_supplicant[512389]: P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:1>
11:45:53 wpa_supplicant[512389]: P2P: cli_channels:
11:45:53 wpa_supplicant[512389]: EAPOL: External notification - portValid=1
11:45:53 wpa_supplicant[512389]: EAPOL: External notification - EAP success=1
11:45:53 wpa_supplicant[512389]: EAPOL: SUPP_PAE entering state AUTHENTICATING
11:45:53 wpa_supplicant[512389]: EAPOL: SUPP_BE entering state SUCCESS
11:45:53 wpa_supplicant[512389]: EAP: EAP entering state DISABLED
11:45:53 wpa_supplicant[512389]: EAPOL: SUPP_PAE entering state AUTHENTICATED
11:45:53 wpa_supplicant[512389]: EAPOL: Supplicant port status: Authorized
11:45:53 wpa_supplicant[512389]: nl80211: Set supplicant port authorized for 06:0c:43:26:59:97
11:45:53 wpa_supplicant[512389]: EAPOL: SUPP_BE entering state IDLE
11:45:53 wpa_supplicant[512389]: EAPOL authentication completed - result=SUCCESS
11:45:53 wpa_supplicant[512389]: nl80211: Set rekey offload
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0
11:45:53 wpa_supplicant[512389]: RTM_NEWLINK: ifi_index=2 ifname=wlan0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
11:45:53 wpa_supplicant[512389]: nl80211: Event message available
11:45:53 wpa_supplicant[512389]: nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wlan0
11:45:53 wpa_supplicant[512389]: nl80211: Control port TX status (ack=1), cookie=4017
11:45:53 wpa_supplicant[512389]: wlan0: Event EAPOL_TX_STATUS (37) received
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/125
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/124
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/126
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/3
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/127
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/128
11:45:53 NetworkManager[512502]: <info> [1766141153.8485] device (wlan0): supplicant interface state: 4way_handshake -> completed
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/129
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/130
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/131
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/132
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/133
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/134
11:45:53 NetworkManager[512502]: <info> [1766141153.8487] device (wlan0): ip:dhcp4: restarting
11:45:53 NetworkManager[512502]: <info> [1766141153.8605] dhcp4 (wlan0): canceled DHCP transaction
11:45:53 NetworkManager[512502]: <info> [1766141153.8605] dhcp4 (wlan0): state changed no lease
11:45:53 NetworkManager[512502]: <info> [1766141153.8605] dhcp4 (wlan0): activation: beginning transaction (timeout in 45 seconds)
11:45:53 NetworkManager[512502]: <info> [1766141153.8609] device (p2p-dev-wlan0): supplicant management interface state: 4way_handshake -> completed
11:45:53 wpa_supplicant[512389]: nl80211: Event message available
11:45:53 wpa_supplicant[512389]: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
11:45:53 wpa_supplicant[512389]: nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan0(44:fa:66:57:9a:c9) A1=44:fa:66:57:9a:c9 A2=06:0c:43:26:59:97 on link_id=-1
11:45:53 wpa_supplicant[512389]: nl80211: MLME event frame - hexdump(len=55): d0 00 24 00 44 fa 66 57 9a c9 06 0c 43 26 59 97 06 0c 43 26 59 97 70 00 05 00 16 00 00 26 18 01 00 0>
11:45:53 wpa_supplicant[512389]: nl80211: Frame event
11:45:53 wpa_supplicant[512389]: nl80211: RX frame da=44:fa:66:57:9a:c9 sa=06:0c:43:26:59:97 bssid=06:0c:43:26:59:97 freq=5240 ssi_signal=-79 fc=0xd0 seq_ctrl=0x70 stype=13 (WLAN>
11:45:53 wpa_supplicant[512389]: wlan0: Event RX_MGMT (18) received
11:45:53 wpa_supplicant[512389]: wlan0: Received Action frame: SA=06:0c:43:26:59:97 Category=5 DataLen=30 freq=5240 MHz
11:45:53 wpa_supplicant[512389]: Measurement request type 5 token 1
11:45:53 wpa_supplicant[512389]: RRM: Radio Measurement report - hexdump(len=1365): 27 f8 01 00 05 80 30 00 00 00 00 00 00 00 00 00 00 09 76 ff 06 0c 43 26 59 97 00 00 00 00 00 0>
11:45:53 wpa_supplicant[512389]: nl80211: Send Action frame (ifindex=2, freq=5240 MHz wait=0 ms no_cck=0 offchanok=1 dst=06:0c:43:26:59:97 src=44:fa:66:57:9a:c9 bssid=06:0c:43:26>
11:45:53 wpa_supplicant[512389]: nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=0 offchanok=1
11:45:53 wpa_supplicant[512389]: CMD_FRAME - hexdump(len=1392): d0 00 00 00 06 0c 43 26 59 97 44 fa 66 57 9a c9 06 0c 43 26 59 97 00 00 05 01 16 27 f8 01 00 05 80 30 00 00 00 00 >
11:45:53 wpa_supplicant[512389]: nl80211: Frame TX command accepted; cookie 0xfb2
11:45:53 wpa_supplicant[512389]: nl80211: Event message available
11:45:53 wpa_supplicant[512389]: nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan0
11:45:53 wpa_supplicant[512389]: nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan0(44:fa:66:57:9a:c9) A1=06:0c:43:26:59:97 A2=44:fa:66:57:9a:c9 on link_id=-1
11:45:53 wpa_supplicant[512389]: nl80211: MLME event frame - hexdump(len=1392): d0 00 00 00 06 0c 43 26 59 97 44 fa 66 57 9a c9 06 0c 43 26 59 97 00 00 05 01 16 27 f8 01 00 05 80>
11:45:53 wpa_supplicant[512389]: nl80211: Frame TX status event A1=06:0c:43:26:59:97 stype=13 cookie=0xfb2 ack=1
11:45:53 wpa_supplicant[512389]: nl80211: Frame TX status: cookie=0xfb2 (match) (ack=1)
11:45:53 wpa_supplicant[512389]: wlan0: Event TX_STATUS (16) received
11:45:53 wpa_supplicant[512389]: wlan0: EVENT_TX_STATUS dst=06:0c:43:26:59:97 type=0 stype=13
11:45:53 wpa_supplicant[512389]: Off-channel: Ignore Action TX status - no pending operation
11:45:55 wpa_supplicant[512389]: EAPOL: startWhen --> 0
11:45:55 wpa_supplicant[512389]: EAPOL: disable timer tick
11:45:57 wpa_supplicant[512389]: nl80211: Event message available
11:45:57 wpa_supplicant[512389]: nl80211: Drv Event 64 (NL80211_CMD_NOTIFY_CQM) received for wlan0
11:45:57 wpa_supplicant[512389]: nl80211: Connection quality monitor event: RSSI low
11:45:57 wpa_supplicant[512389]: nl80211: Signal: -80 dBm txrate: 720600
11:45:57 wpa_supplicant[512389]: nl80211: Noise: 9999 dBm
11:45:57 wpa_supplicant[512389]: wlan0: Event SIGNAL_CHANGE (24) received
11:45:57 wpa_supplicant[512389]: wlan0: CTRL-EVENT-SIGNAL-CHANGE above=0 signal=-80 noise=9999 txrate=720600
11:45:57 wpa_supplicant[512389]: bgscan simple: signal level changed (above=0 current_signal=-80 current_noise=9999 current_txrate=720600))
11:45:57 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0
11:45:58 kernel: wlan0: deauthenticated from 06:0c:43:26:59:97 (Reason: 15=4WAY_HANDSHAKE_TIMEOUT)
11:45:58 wpa_supplicant[512389]: RTM_NEWLINK: ifi_index=2 ifname=wlan0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
11:45:58 NetworkManager[512502]: <info> [1766141158.0744] device (wlan0): ip:dhcp4: restarting
11:45:58 NetworkManager[512502]: <info> [1766141158.0815] dhcp4 (wlan0): canceled DHCP transaction
11:45:58 NetworkManager[512502]: <info> [1766141158.0815] dhcp4 (wlan0): state changed no lease
11:45:58 NetworkManager[512502]: <info> [1766141158.0815] dhcp4 (wlan0): activation: beginning transaction (timeout in 45 seconds)
11:45:58 wpa_supplicant[512389]: nl80211: Event message available
11:45:58 wpa_supplicant[512389]: nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
11:45:58 wpa_supplicant[512389]: nl80211: Delete station 06:0c:43:26:59:97
11:45:58 wpa_supplicant[512389]: nl80211: Event message available
11:45:58 wpa_supplicant[512389]: nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlan0
11:45:58 wpa_supplicant[512389]: nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlan0(44:fa:66:57:9a:c9) A1=44:fa:66:57:9a:c9 A2=06:0c:43:26:59:97 on link_id=-1
11:45:58 wpa_supplicant[512389]: nl80211: MLME event frame - hexdump(len=26): c0 00 24 00 44 fa 66 57 9a c9 06 0c 43 26 59 97 06 0c 43 26 59 97 90 0d 0f 00
11:45:58 wpa_supplicant[512389]: nl80211: Deauthenticate event
11:45:58 wpa_supplicant[512389]: wlan0: Event DEAUTH (11) received
11:45:58 wpa_supplicant[512389]: wlan0: Deauthentication notification
11:45:58 wpa_supplicant[512389]: wlan0: * reason 15 (4WAY_HANDSHAKE_TIMEOUT)
11:45:58 wpa_supplicant[512389]: wlan0: * address 06:0c:43:26:59:97
11:45:58 wpa_supplicant[512389]: Deauthentication frame IE(s) - hexdump(len=0): [NULL]
11:45:58 wpa_supplicant[512389]: wlan0: CTRL-EVENT-DISCONNECTED bssid=06:0c:43:26:59:97 reason=15
And a longer stretch of time: