22 年 6 月京东入手一台微果 C1 ,在卧室投影看柯南和小新当背景音非常满意,期间有更新几个系统版本,出问题时检测为最新。 这是一台只能搜索到 2.4G 的设备,我用 K2P 放了一个 2.4G 只有投影仪使用,从入手到 12 月都正常在用,未发现连接问题。问题出在 12 月 28 号的时候,说来也巧,这天中招了开始请假,发现投影仪一直提示 xxx Wi-Fi 认证失败,反复连上几秒到几十秒就断开出现提示,然后我就去捣鼓了一下路由器,修改 SSID 名称密码、手动改信道、改加密逻辑、改为无密码认证、重置等,还是无法正常使用,然后尝试更换了路由器并执行以上操作,也依然如此。然后使用 iPhone 、一加放了热点,都还是不行。期间尝试了重置投影仪系统也是一样。 就这样搞了两天最后我笃定是投影仪坏了,因为人不舒服就躺了几天。申请了京东售后,京东很爽快的给我寄来一台新的,1 月 4 号收到,快快乐乐打开连接,不到 5 秒,立马就弹窗了,我人都麻了,不太理解这个情况,尝试联系坚果客服(是坚果的子品牌),说没有遇过这样的情况。 因为微果 C1 的系统无线能连上 ADB (非常良心),我判断系统可能也带有调试控制台,在点击系统版本后果然出现了一个 log 页面,在 log 页面开启日志后,在 Wi-Fi 反复断开的间隙中艰难的导出 log ,我截取了应该是触发了断开的 log 片段,有没有大佬能看明白为啥。
01-05 23:49:34.008 3383 3383 D wpa_supplicant: nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlan0
01-05 23:49:34.008 3383 3383 D wpa_supplicant: nl80211: Disconnect event
01-05 23:49:34.008 3383 3383 D wpa_supplicant: wlan0: Event DEAUTH (11) received
01-05 23:49:34.008 3383 3383 D wpa_supplicant: wlan0: Deauthentication notification
01-05 23:49:34.008 3383 3383 D wpa_supplicant: wlan0: * reason 1
01-05 23:49:34.008 3383 3383 D wpa_supplicant: Deauthentication frame IE(s) - hexdump(len=0): [NULL]
01-05 23:49:34.008 3383 3383 I wpa_supplicant: wlan0: CTRL-EVENT-DISCONNECTED bssid=24:cf:24:bb:44:4d reason=1
01-05 23:49:34.008 3383 3383 D wpa_supplicant: wlan0: Auto connect disabled: do not try to re-connect
01-05 23:49:34.008 3383 3383 D wpa_supplicant: wlan0: Ignore connection failure indication since interface has been put into disconnected state
01-05 23:49:34.009 3383 3383 D wpa_supplicant: TDLS: Remove peers on disassociation
01-05 23:49:34.009 3383 3383 D wpa_supplicant: wlan0: WPA: Clear old PMK and PTK
01-05 23:49:34.009 3383 3383 D wpa_supplicant: Notifying disconnect reason to hidl control: 1
01-05 23:49:34.009 3383 3383 D wpa_supplicant: wlan0: Disconnect event - remove keys
01-05 23:49:34.009 3383 3383 D wpa_supplicant: wpa_driver_nl80211_set_key: ifindex=11 (wlan0) alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0
01-05 23:49:34.009 3383 3383 D wpa_supplicant: wpa_driver_nl80211_set_key: ifindex=11 (wlan0) alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0
01-05 23:49:34.009 3179 3642 D SupplicantStaIfaceHal: ISupplicantStaIfaceCallback.onDisconnected received
01-05 23:49:34.009 3383 3383 D wpa_supplicant: wpa_driver_nl80211_set_key: ifindex=11 (wlan0) alg=0 addr=0xb32290c0 key_idx=0 set_tx=0 seq_len=0 key_len=0
01-05 23:49:34.009 3179 3642 E SupplicantStaIfaceHal: onDisconnected 4way=false locallyGenerated=false reasonCode=1
01-05 23:49:34.009 3383 3383 D wpa_supplicant: addr=24:cf:24:bb:44:4d
01-05 23:49:34.009 3383 3383 D wpa_supplicant: nl80211: Data frame filter flags=0x0
01-05 23:49:34.009 3179 3642 D JmGOWifiEventTracker: setDisconnectionEvent reason:1
01-05 23:49:34.010 3383 3383 D wpa_supplicant: wlan0: State: COMPLETED -> DISCONNECTED
01-05 23:49:34.010 3383 3383 D wpa_supplicant: nl80211: Set wlan0 operstate 1->0 (DORMANT)
01-05 23:49:34.010 3179 3345 D JmGOWifiEventTracker: handleMessage: E msg.what=10005
01-05 23:49:34.010 3179 3345 D JmGOWifiEventTracker: processMsg: ConnectedState
01-05 23:49:34.010 3383 3383 D wpa_supplicant: netlink: Operstate: ifindex=11 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
01-05 23:49:34.010 3179 3345 D JmGOWifiEventTracker: ConnectedState EVENT_SET_NETWORK_STATE
01-05 23:49:34.010 3383 3383 D wpa_supplicant: Notifying state change event to hidl control: 0
01-05 23:49:34.010 3179 3345 D JmGOWifiEventTracker: processMsg: ConnectModeState
01-05 23:49:34.010 3179 3345 D JmGOWifiEventTracker: ConnectModeState EVENT_SET_NETWORK_STATE
01-05 23:49:34.010 3383 3383 D wpa_supplicant: Notifying bssid changed to hidl control
01-05 23:49:34.010 3383 3383 D wpa_supplicant: EAPOL: External notification - portEnabled=0
01-05 23:49:34.010 3383 3383 D wpa_supplicant: EAPOL: SUPP_PAE entering state DISCONNECTED
01-05 23:49:34.010 3383 3383 D wpa_supplicant: EAPOL: Supplicant port status: Unauthorized
01-05 23:49:34.010 3179 3345 D JmGOWifiEventTracker: handleMessage: X
01-05 23:49:34.010 3383 3383 D wpa_supplicant: nl80211: Skip set_supp_port(unauthorized) while not associated
01-05 23:49:34.010 3383 3383 D wpa_supplicant: EAPOL: SUPP_BE entering state INITIALIZE
01-05 23:49:34.010 3383 3383 D wpa_supplicant: EAPOL: External notification - portValid=0
01-05 23:49:34.010 3383 3383 D wpa_supplicant: EAPOL: External notification - EAP success=0
01-05 23:49:34.010 3383 3383 D wpa_supplicant: RTM_NEWLINK: ifi_index=11 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING])
01-05 23:49:34.010 3179 3260 I EthernetTracker: interfaceLinkStateChanged, iface: wlan0, up: false
01-05 23:49:34.010 3383 3383 D wpa_supplicant: RTM_NEWLINK: ifi_index=11 ifname=wlan0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
01-05 23:49:34.011 3179 3260 D PppoeUtils: updateInterface: wlan0 link down
01-05 23:49:34.011 3383 3383 D wpa_supplicant: nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlan0
01-05 23:49:34.011 3383 3383 D wpa_supplicant: nl80211: Regulatory domain change
01-05 23:49:34.011 2786 2786 I wificond: Regulatory domain changed
01-05 23:49:34.011 3383 3383 D wpa_supplicant: * initiator=0
01-05 23:49:34.011 3383 3383 D wpa_supplicant: * type=1
01-05 23:49:34.011 3383 3383 D wpa_supplicant: wlan0: Event CHANNEL_LIST_CHANGED (27) received
01-05 23:49:34.011 3383 3383 I wpa_supplicant: wlan0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
01-05 23:49:34.011 3383 3383 D wpa_supplicant: wlan0: Updating hw mode
01-05 23:49:34.011 3179 3642 D SupplicantStaIfaceHal: ISupplicantStaIfaceCallback.onStateChanged received
01-05 23:49:34.011 3383 3383 D wpa_supplicant: nl80211: Regulatory information - country=00
01-05 23:49:34.011 3383 3383 D wpa_supplicant: nl80211: 2402-2472 @ 40 MHz 20 mBm
01-05 23:49:34.011 3383 3383 D wpa_supplicant: nl80211: 2457-2482 @ 20 MHz 20 mBm
01-05 23:49:34.011 3383 3383 D wpa_supplicant: nl80211: 5170-5250 @ 80 MHz 20 mBm
01-05 23:49:34.011 3383 3383 D wpa_supplicant: nl80211: 5250-5330 @ 80 MHz 20 mBm
01-05 23:49:34.011 3383 3383 D wpa_supplicant: nl80211: 5490-5730 @ 160 MHz 20 mBm
01-05 23:49:34.011 3179 3642 D JmGOWifiEventTracker: setSupplicantState supState:DISCONNECTED
01-05 23:49:34.011 3383 3383 D wpa_supplicant: nl80211: 5735-5835 @ 80 MHz 20 mBm
01-05 23:49:34.011 3179 3642 D JmGOWifiEventTracker: setWifiNetworkState state:DISCONNECTED
01-05 23:49:34.011 3383 3383 D wpa_supplicant: nl80211: Added 802.11b mode based on 802.11g information
01-05 23:49:34.003 2888 2888 I NiEvMon : type=1400 audit(0.0:9730): avc: denied { read } for name="printk" dev="proc" ino=20652 scontext=u:r:mt_dtv-svc:s0 tcontext=u:object_r:proc_sys_kernel_printk:s0 tclass=file permissive=1
01-05 23:49:34.012 3179 3344 D WifiStateMachine: ConnectedState !NETWORK_DISCONNECTION_EVENT rt=274797/274797 24:cf:24:bb:44:4d nid=0 reason=1 lastbssid=24:cf:24:bb:44:4d freq=2447 rssi=-47
01-05 23:49:34.012 3179 3642 D SupplicantStaIfaceHal: ISupplicantStaIfaceCallback.onBssidChanged received
01-05 23:49:34.012 3179 3344 W LastMileLogger: Ignoring negative connection id: -1
01-05 23:49:34.012 3179 3345 D JmGOWifiEventTracker: handleMessage: E msg.what=10005
01-05 23:49:34.012 3179 3345 D JmGOWifiEventTracker: processMsg: ConnectedState
01-05 23:49:34.012 3179 3345 D JmGOWifiEventTracker: ConnectedState EVENT_SET_NETWORK_STATE
01-05 23:49:34.012 3179 3345 D JmGOWifiEventTracker: transitionTo: destState=ConnectModeState
01-05 23:49:34.012 3179 3345 D JmGOWifiEventTracker: processMsg: ConnectModeState
01-05 23:49:34.012 3179 3345 D JmGOWifiEventTracker: ConnectModeState EVENT_SET_NETWORK_STATE
01-05 23:49:34.012 3179 3345 D JmGOWifiEventTracker: handleMessage: new destination call exit/enter
01-05 23:49:34.012 3179 3345 D JmGOWifiEventTracker: setupTempStateStackWithStatesToEnter: X mTempStateStackCount=1,curStateInfo: state=DefaultState,active=true,parent=null
01-05 23:49:34.012 3179 3345 D JmGOWifiEventTracker: invokeExitMethods: ConnectedState
01-05 23:49:34.013 3179 3345 D JmGOWifiEventTracker: invokeExitMethods: ConnectModeState
01-05 23:49:34.013 3179 3345 D JmGOWifiEventTracker: moveTempStackToStateStack: i=0,j=1
01-05 23:49:34.013 2786 2786 I wificond: 2.4Ghz frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472
01-05 23:49:34.013 3179 3345 D JmGOWifiEventTracker: moveTempStackToStateStack: X mStateStackTop=1,startingIndex=1,Top=ConnectModeState
01-05 23:49:34.013 2786 2786 I wificond: 5Ghz non-DFS frequencies:
01-05 23:49:34.013 3179 3345 D JmGOWifiEventTracker: invokeEnterMethods: ConnectModeState
01-05 23:49:34.013 2786 2786 I wificond: 5Ghz DFS frequencies:
01-05 23:49:34.013 3179 3345 D JmGOWifiEventTracker: handleMessage: X
01-05 23:49:34.013 3179 3260 V WifiNative: Interface status unchanged on Iface:{Name=wlan0,Id=0,Type=STA} from true, Ignoring...
01-05 23:49:34.013 3179 3260 E WifiService: XXXXX WifiInterfaceObserver interfaceLinkStateChanged wlan0 up=false
01-05 23:49:34.013 2720 2720 D WifiHAL : Start get packet fate command
01-05 23:49:34.013 2720 2720 D WifiHAL : createRequest Get Tx packet fate request
01-05 23:49:34.014 3179 3260 I EthernetTracker: interfaceLinkStateChanged, iface: wlan0, up: false
01-05 23:49:34.014 3179 3260 D PppoeUtils: updateInterface: wlan0 link down
01-05 23:49:34.014 2720 2720 D WifiHAL : Start get packet fate command
01-05 23:49:34.014 2720 2720 D WifiHAL : createRequest Get Rx packet fate request
1
ju5t4fun 2023-01-10 14:39:26 +08:00
试过路由器 WiFi 先隐藏 ssid ,然后换个 ssid 名字吗?
看到 log 里有 Deauthentication ,搞不好是有人闲得无聊在搞断网攻击 |
2
OCD2057 2023-01-10 15:14:56 +08:00
感觉是你附近有人一直在发 deauth, 导致 station 认为自己断网
|
3
wpo OP @ju5t4fun 试过隐藏,然后在投影仪直接添加,也会这样。
Deauthentication 这个攻击是针对 2.4G 的吗?手机连接 2.4G 没有影响。 |
4
systemcall 2023-01-10 19:44:19 +08:00
@wpo #3
很多人是闲得无聊拿 esp8266 之类的物联网模块做的,一般是只有 2.4G 的,因为便宜 |
5
ysc3839 2023-01-10 20:06:29 +08:00 via Android
手机没问题的话可能是能防这种攻击,我之前试过路由器上跑 mdk3 模拟 SSID 来实现模拟定位,三星 S5 是能搜到这些 SSID ,定位也变了,但是小米 6 就搜不到。
|