Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

I can not connect to the BSSID by this tool with macOS mojave 10.14.3 #8

Open
buddhist182 opened this issue Apr 30, 2019 · 11 comments
Open

Comments

@buddhist182
Copy link

I have tried this tool on my mac with version macOS mojave 10.14.3,but it does not work,the detail is :
Notice: The interface en0 is in 802.11ac phyMode.
***** Scanned networks *****
ESSID, BSSID, Ch, RSSI(dBm)
12345678, (null), 157, -61
DIRECT-M7-客厅的小米盒子, (null), 1, -62
HUAWEI-176A, (null), 10, -60
PandoraBox-2.4G-B663AB, (null), 10, -61
ROKID.CLOUD, (null), 11, -54
ROKID.GUEST, (null), 11, -54
ROKID.HOMEBASE-2.4G, (null), 11, -70
ROKID.HOMEBASE-5G, (null), 149, -82
ROKID.IOT, (null), 6, -68
ROKID.OFFICE, (null), 157, -88
ROKID.TC, (null), 6, -67
ROKID.TEXT, (null), 1, -59
SmartLife-B06F, (null), 1, -38
Xiaomi_71_2.4G, (null), 1, -52
rokid-22D-1F, (null), 1, -45


All the BSSID is null,and there is many bssid lost,the bssid scanned by airport is :

                        SSID BSSID             RSSI CHANNEL HT CC SECURITY (auth/unicast/group)
                    ROKID.TC 04:40:a9:57:db:60 -69  1       Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                 ROKID.GUEST 04:40:a9:57:db:62 -67  1       Y  CN WPA(PSK/AES/AES)
                ROKID.OFFICE 04:40:a9:57:db:65 -66  1       Y  CN NONE
                 ROKID.CLOUD 04:40:a9:57:e4:f1 -60  1       Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                 ROKID.GUEST 04:40:a9:57:e4:f2 -60  1       Y  CN WPA(PSK/AES/AES)
                  ROKID.TEXT 04:40:a9:57:e4:f3 -61  1       Y  CN WPA(PSK/AES/AES)
                ROKID.OFFICE 04:40:a9:57:e4:f5 -61  1       Y  CN NONE
                 ROKID.GUEST 04:40:a9:a1:c1:b3 -66  6       Y  CN WPA(PSK/AES/AES)
                  ROKID.TEXT 04:40:a9:a1:c1:b4 -65  6       Y  CN WPA(PSK/AES/AES)
                ROKID.OFFICE 04:40:a9:a1:c1:b6 -66  6       Y  CN NONE
                 ROKID.CLOUD 04:40:a9:57:db:61 -66  1       Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                  ROKID.TEXT 04:40:a9:57:db:63 -66  1       Y  CN WPA(PSK/AES/AES)
                    ROKID.TC 04:40:a9:a1:c1:b0 -69  6       Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                   ROKID.IOT 04:40:a9:a1:c1:b1 -66  6       Y  CN WPA2(PSK/AES/AES)
                 ROKID.CLOUD 04:40:a9:a1:c1:b2 -67  6       Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                    ROKID.TC 04:40:a9:57:f1:e0 -53  11      Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                 ROKID.CLOUD 04:40:a9:57:e4:e1 -73  157,+1  Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                 ROKID.GUEST 04:40:a9:57:f1:e2 -53  11      Y  CN WPA(PSK/AES/AES)
                 ROKID.CLOUD 04:40:a9:57:f1:e1 -52  11      Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                ROKID.OFFICE 04:40:a9:57:e4:d5 -67  60,+1   Y  CN NONE
                  ROKID.TEXT 04:40:a9:57:e4:d3 -67  60,+1   Y  CN WPA(PSK/AES/AES)
                 ROKID.GUEST 04:40:a9:57:e4:d2 -67  60,+1   Y  CN WPA(PSK/AES/AES)
                 ROKID.CLOUD 04:40:a9:57:e4:d1 -67  60,+1   Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                    ROKID.TC 04:40:a9:57:e4:d0 -66  60,+1   Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                ROKID.OFFICE 04:40:a9:57:fe:75 -42  11      Y  CN NONE
                  ROKID.TEXT 04:40:a9:57:fe:73 -42  11      Y  CN WPA(PSK/AES/AES)
                 ROKID.GUEST 04:40:a9:57:fe:72 -41  11      Y  CN WPA(PSK/AES/AES)
                 ROKID.CLOUD 04:40:a9:57:fe:71 -41  11      Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                    ROKID.TC 04:40:a9:57:fe:70 -42  11      Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
         ROKID.HOMEBASE-2.4G 6c:b0:ce:11:e5:6f -69  11      Y  -- WPA2(PSK/AES/AES)
                 HUAWEI-176A 14:9d:09:04:17:6a -62  10      Y  -- WPA2(PSK/AES/AES)
      PandoraBox-2.4G-B663AB fc:7c:02:b6:63:ab -60  10      Y  CN NONE
                ROKID.OFFICE 04:40:a9:57:f1:e5 -52  11      Y  CN NONE
                  ROKID.TEXT 04:40:a9:57:f1:e3 -52  11      Y  CN WPA(PSK/AES/AES)
                    12345678 50:64:2b:61:4e:d3 -37  6       Y  CN WPA(PSK/TKIP,AES/TKIP) WPA2(PSK/TKIP,AES/TKIP)
                    ROKID.TC 04:40:a9:57:e4:f0 -61  1       Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)

DIRECT-M7-客厅的小米盒子 8e:5a:f8:0e:5c:8a -62 1 Y -- WPA2(PSK/AES/AES)
rokid-22D-1F b8:f8:83:e5:6f:61 -46 1,+1 Y -- WPA(PSK/AES,TKIP/TKIP) WPA2(PSK/AES,TKIP/TKIP)
SmartLife-B06F 5e:cf:7f:34:b0:6f -38 1 N -- NONE
Xiaomi_71_2.4G 8c:be:be:30:71:d0 -53 1 Y -- WPA(PSK/AES,TKIP/TKIP) WPA2(PSK/AES,TKIP/TKIP)
ROKID.OFFICE 04:40:a9:a1:bd:25 -85 36 Y CN NONE
ROKID.TEXT 04:40:a9:a1:bd:23 -83 36 Y CN WPA(PSK/AES/AES)
ROKID.GUEST 04:40:a9:a1:bd:22 -83 36 Y CN WPA(PSK/AES/AES)
ROKID.CLOUD 04:40:a9:a1:bd:21 -83 36 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.TC 04:40:a9:a1:bd:20 -84 36 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.TEXT 04:40:a9:a1:c2:63 -86 157 Y CN WPA(PSK/AES/AES)
ROKID.OFFICE 04:40:a9:57:e4:e5 -72 157,+1 Y CN NONE
ROKID.TEXT 04:40:a9:57:e4:e3 -73 157,+1 Y CN WPA(PSK/AES/AES)
ROKID.OFFICE 04:40:a9:a1:c2:65 -89 157 Y CN NONE
ROKID.GUEST 04:40:a9:57:e4:e2 -72 157,+1 Y CN WPA(PSK/AES/AES)
ROKID.GUEST 04:40:a9:a1:c2:62 -87 157 Y CN WPA(PSK/AES/AES)
ROKID.TC 04:40:a9:57:e4:e0 -72 157,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.CLOUD 04:40:a9:a1:c2:61 -87 157 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.TC 04:40:a9:a1:c2:60 -87 157 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.OFFICE 04:40:a9:57:f1:c5 -64 157,+1 Y CN NONE
ROKID.OFFICE 04:40:a9:57:fe:65 -54 157,+1 Y CN NONE
ROKID.TEXT 04:40:a9:57:f1:c3 -64 157,+1 Y CN WPA(PSK/AES/AES)
ROKID.TEXT 04:40:a9:57:fe:63 -54 157,+1 Y CN WPA(PSK/AES/AES)
ROKID.GUEST 04:40:a9:57:f1:c2 -64 157,+1 Y CN WPA(PSK/AES/AES)
ROKID.GUEST 04:40:a9:57:fe:62 -52 157,+1 Y CN WPA(PSK/AES/AES)
ROKID.CLOUD 04:40:a9:57:f1:c1 -64 157,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.CLOUD 04:40:a9:57:fe:61 -54 157,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.TC 04:40:a9:57:f1:c0 -64 157,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.TC 04:40:a9:57:fe:60 -53 157,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
12345678 50:64:2b:61:4e:d4 -58 157 Y CN WPA(PSK/TKIP,AES/TKIP) WPA2(PSK/TKIP,AES/TKIP)
ROKID.OFFICE 04:40:a9:a1:c1:a6 -81 149 Y CN NONE
ROKID.TEXT 04:40:a9:a1:c1:a4 -81 149 Y CN WPA(PSK/AES/AES)
ROKID.OFFICE 04:40:a9:57:f1:d5 -59 149,+1 Y CN NONE
ROKID.GUEST 04:40:a9:a1:c1:a3 -80 149 Y CN WPA(PSK/AES/AES)
ROKID.TEXT 04:40:a9:57:f1:d3 -59 149,+1 Y CN WPA(PSK/AES/AES)
ROKID.GUEST 04:40:a9:57:f1:d2 -59 149,+1 Y CN WPA(PSK/AES/AES)
ROKID.CLOUD 04:40:a9:57:f1:d1 -59 149,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.HOMEBASE-5G 6c:b0:ce:11:e5:71 -81 149,+1 Y -- WPA2(PSK/AES/AES)
ROKID.TC 04:40:a9:57:f1:d0 -59 149,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.CLOUD 04:40:a9:a1:c1:a2 -80 149 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.IOT 04:40:a9:a1:c1:a1 -81 149 Y CN WPA2(PSK/AES/AES)
ROKID.TC 04:40:a9:a1:c1:a0 -80 149 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.OFFICE 04:40:a9:57:fe:55 -44 44,+1 Y CN NONE
ROKID.TEXT 04:40:a9:57:fe:53 -44 44,+1 Y CN WPA(PSK/AES/AES)
ROKID.GUEST 04:40:a9:57:fe:52 -44 44,+1 Y CN WPA(PSK/AES/AES)
ROKID.CLOUD 04:40:a9:57:fe:51 -43 44,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.TC 04:40:a9:57:fe:50 -43 44,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)

Can any one git some solution?
Thanks!

@Moorviper
Copy link

location services enabled ?

@sushihangover
Copy link

Same problem on 10.14.6, all the BSSID/Macs are returned as null thus it can not find/connect the correct AP.

***** Scanned networks *****
                   ESSID,             BSSID,  Ch, RSSI(dBm)
         AndroidRepeater,            (null),   2, -22
               CableWiFi,            (null),   1, -86
                 XFINITY,            (null),   1, -84
                  iPhone,            (null),   1, -71
             xfinitywifi,            (null),   6, -78

@dayongkr
Copy link

Same problem on 10.15

@Moorviper
Copy link

Moorviper commented Oct 11, 2019

have you downloaded the precompiled binary then this is normal ;-)
After downloading the source and compile it by myself it worked for me.
at least up to 10.14 / haven't installed 10.15 yet

And also when you have disabled the location services on the system settings which is a bullsh** requirement to get the bssid from the wifi firmware .... :-/

@vwade
Copy link

vwade commented Dec 10, 2019

I am actually both ahead and behind a bit on this issue.

On the one hand, I can successfully associate and connect to a specific BSSID. For example,

$ airport-bssid en1 00:f6:63:cd:4b:2f

On the other hand, I do not know how to enter AES/EAP-PEAP (MSCHAPv2) authentication into the command line and, as such, 802.1X cannot authenticate (username & password). My device connects and obtains a self-assigned IP address, but then idles endlessly as it cannot authenticate. As an example,

$ airport-bssid en1 00:f6:63:cd:4b:2f <username> <password>

I am trying to connect to a single access point within a building's wifi mesh. It's due to the fact that some nodes are highly problematic, and connecting to them results in me being disconnected from the internet.

What could help me is knowing how to include my credentials in the command line for authentication. Thanks!!

@vesper8
Copy link

vesper8 commented Apr 28, 2020

did you ever figure out how to pass your credentials @vwade ?

or did you figure out an alternative on how to connect to a specific bssid on OSX Mojave?

@sbliven
Copy link

sbliven commented Nov 12, 2020

I'm also seeing (null) BSSID on 10.15 Catalina.

  • Built from source
  • Enabled location services in System Preferences (and no longer get the prompt)
  • Tried with/without sudo

Always get the same result

$ sudo build/Release/airport-bssid
Interface: en0
PHY mode: 802.11ac.
***** Scanned networks *****
                 ESSID,             BSSID,  Ch, RSSI(dBm)
                 Printer,          (null),  11, -51
                 myNet,            (null), 100, -76
                 myNet,            (null),  10, -59
                 Neighbors,        (null),   6, -73
****************************
Network scan completed. If you want to connect to a specific BSSID, please enter the command below:
airport-bssid <ifname> <bssid> [<password>]

@gMan1990
Copy link

gMan1990 commented Sep 9, 2021

BSSID always null on 10.14.6, ME293xx/A

@alexgershberg
Copy link

alexgershberg commented May 25, 2023

Same issue for me :(
13.3.1

@giuliomoro
Copy link

giuliomoro commented Aug 15, 2023

As I was getting BSSID always NULL on Monterey, I forked the project and allow to specify SSID and channel to achieve something similar.
https://github.com/giuliomoro/airport-ssid-channel

Of course you are still fighting against airport's setting which may switch network based on its JoinMode.

@eleweek
Copy link

eleweek commented Oct 2, 2023

@giuliomoro Thank you for this, the tool seems to be helpful for me. One thing you might want to do is to delete the old build of the original tool from ./Build/Release

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests