airport-bssid
airport-bssid copied to clipboard
I can not connect to the BSSID by this tool with macOS mojave 10.14.3
I have tried this tool on my mac with version macOS mojave 10.14.3,but it does not work,the detail is : Notice: The interface en0 is in 802.11ac phyMode. ***** Scanned networks ***** ESSID, BSSID, Ch, RSSI(dBm) 12345678, (null), 157, -61 DIRECT-M7-客厅的小米盒子, (null), 1, -62 HUAWEI-176A, (null), 10, -60 PandoraBox-2.4G-B663AB, (null), 10, -61 ROKID.CLOUD, (null), 11, -54 ROKID.GUEST, (null), 11, -54 ROKID.HOMEBASE-2.4G, (null), 11, -70 ROKID.HOMEBASE-5G, (null), 149, -82 ROKID.IOT, (null), 6, -68 ROKID.OFFICE, (null), 157, -88 ROKID.TC, (null), 6, -67 ROKID.TEXT, (null), 1, -59 SmartLife-B06F, (null), 1, -38 Xiaomi_71_2.4G, (null), 1, -52 rokid-22D-1F, (null), 1, -45
All the BSSID is null,and there is many bssid lost,the bssid scanned by airport is :
SSID BSSID RSSI CHANNEL HT CC SECURITY (auth/unicast/group)
ROKID.TC 04:40:a9:57:db:60 -69 1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.GUEST 04:40:a9:57:db:62 -67 1 Y CN WPA(PSK/AES/AES)
ROKID.OFFICE 04:40:a9:57:db:65 -66 1 Y CN NONE
ROKID.CLOUD 04:40:a9:57:e4:f1 -60 1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.GUEST 04:40:a9:57:e4:f2 -60 1 Y CN WPA(PSK/AES/AES)
ROKID.TEXT 04:40:a9:57:e4:f3 -61 1 Y CN WPA(PSK/AES/AES)
ROKID.OFFICE 04:40:a9:57:e4:f5 -61 1 Y CN NONE
ROKID.GUEST 04:40:a9:a1:c1:b3 -66 6 Y CN WPA(PSK/AES/AES)
ROKID.TEXT 04:40:a9:a1:c1:b4 -65 6 Y CN WPA(PSK/AES/AES)
ROKID.OFFICE 04:40:a9:a1:c1:b6 -66 6 Y CN NONE
ROKID.CLOUD 04:40:a9:57:db:61 -66 1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.TEXT 04:40:a9:57:db:63 -66 1 Y CN WPA(PSK/AES/AES)
ROKID.TC 04:40:a9:a1:c1:b0 -69 6 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.IOT 04:40:a9:a1:c1:b1 -66 6 Y CN WPA2(PSK/AES/AES)
ROKID.CLOUD 04:40:a9:a1:c1:b2 -67 6 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.TC 04:40:a9:57:f1:e0 -53 11 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.CLOUD 04:40:a9:57:e4:e1 -73 157,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.GUEST 04:40:a9:57:f1:e2 -53 11 Y CN WPA(PSK/AES/AES)
ROKID.CLOUD 04:40:a9:57:f1:e1 -52 11 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.OFFICE 04:40:a9:57:e4:d5 -67 60,+1 Y CN NONE
ROKID.TEXT 04:40:a9:57:e4:d3 -67 60,+1 Y CN WPA(PSK/AES/AES)
ROKID.GUEST 04:40:a9:57:e4:d2 -67 60,+1 Y CN WPA(PSK/AES/AES)
ROKID.CLOUD 04:40:a9:57:e4:d1 -67 60,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.TC 04:40:a9:57:e4:d0 -66 60,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.OFFICE 04:40:a9:57:fe:75 -42 11 Y CN NONE
ROKID.TEXT 04:40:a9:57:fe:73 -42 11 Y CN WPA(PSK/AES/AES)
ROKID.GUEST 04:40:a9:57:fe:72 -41 11 Y CN WPA(PSK/AES/AES)
ROKID.CLOUD 04:40:a9:57:fe:71 -41 11 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.TC 04:40:a9:57:fe:70 -42 11 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
ROKID.HOMEBASE-2.4G 6c:b0:ce:11:e5:6f -69 11 Y -- WPA2(PSK/AES/AES)
HUAWEI-176A 14:9d:09:04:17:6a -62 10 Y -- WPA2(PSK/AES/AES)
PandoraBox-2.4G-B663AB fc:7c:02:b6:63:ab -60 10 Y CN NONE
ROKID.OFFICE 04:40:a9:57:f1:e5 -52 11 Y CN NONE
ROKID.TEXT 04:40:a9:57:f1:e3 -52 11 Y CN WPA(PSK/AES/AES)
12345678 50:64:2b:61:4e:d3 -37 6 Y CN WPA(PSK/TKIP,AES/TKIP) WPA2(PSK/TKIP,AES/TKIP)
ROKID.TC 04:40:a9:57:e4:f0 -61 1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
DIRECT-M7-客厅的小米盒子 8e:5a:f8:0e:5c:8a -62 1 Y -- WPA2(PSK/AES/AES) rokid-22D-1F b8:f8:83:e5:6f:61 -46 1,+1 Y -- WPA(PSK/AES,TKIP/TKIP) WPA2(PSK/AES,TKIP/TKIP) SmartLife-B06F 5e:cf:7f:34:b0:6f -38 1 N -- NONE Xiaomi_71_2.4G 8c:be:be:30:71:d0 -53 1 Y -- WPA(PSK/AES,TKIP/TKIP) WPA2(PSK/AES,TKIP/TKIP) ROKID.OFFICE 04:40:a9:a1:bd:25 -85 36 Y CN NONE ROKID.TEXT 04:40:a9:a1:bd:23 -83 36 Y CN WPA(PSK/AES/AES) ROKID.GUEST 04:40:a9:a1:bd:22 -83 36 Y CN WPA(PSK/AES/AES) ROKID.CLOUD 04:40:a9:a1:bd:21 -83 36 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.TC 04:40:a9:a1:bd:20 -84 36 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.TEXT 04:40:a9:a1:c2:63 -86 157 Y CN WPA(PSK/AES/AES) ROKID.OFFICE 04:40:a9:57:e4:e5 -72 157,+1 Y CN NONE ROKID.TEXT 04:40:a9:57:e4:e3 -73 157,+1 Y CN WPA(PSK/AES/AES) ROKID.OFFICE 04:40:a9:a1:c2:65 -89 157 Y CN NONE ROKID.GUEST 04:40:a9:57:e4:e2 -72 157,+1 Y CN WPA(PSK/AES/AES) ROKID.GUEST 04:40:a9:a1:c2:62 -87 157 Y CN WPA(PSK/AES/AES) ROKID.TC 04:40:a9:57:e4:e0 -72 157,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.CLOUD 04:40:a9:a1:c2:61 -87 157 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.TC 04:40:a9:a1:c2:60 -87 157 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.OFFICE 04:40:a9:57:f1:c5 -64 157,+1 Y CN NONE ROKID.OFFICE 04:40:a9:57:fe:65 -54 157,+1 Y CN NONE ROKID.TEXT 04:40:a9:57:f1:c3 -64 157,+1 Y CN WPA(PSK/AES/AES) ROKID.TEXT 04:40:a9:57:fe:63 -54 157,+1 Y CN WPA(PSK/AES/AES) ROKID.GUEST 04:40:a9:57:f1:c2 -64 157,+1 Y CN WPA(PSK/AES/AES) ROKID.GUEST 04:40:a9:57:fe:62 -52 157,+1 Y CN WPA(PSK/AES/AES) ROKID.CLOUD 04:40:a9:57:f1:c1 -64 157,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.CLOUD 04:40:a9:57:fe:61 -54 157,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.TC 04:40:a9:57:f1:c0 -64 157,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.TC 04:40:a9:57:fe:60 -53 157,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) 12345678 50:64:2b:61:4e:d4 -58 157 Y CN WPA(PSK/TKIP,AES/TKIP) WPA2(PSK/TKIP,AES/TKIP) ROKID.OFFICE 04:40:a9:a1:c1:a6 -81 149 Y CN NONE ROKID.TEXT 04:40:a9:a1:c1:a4 -81 149 Y CN WPA(PSK/AES/AES) ROKID.OFFICE 04:40:a9:57:f1:d5 -59 149,+1 Y CN NONE ROKID.GUEST 04:40:a9:a1:c1:a3 -80 149 Y CN WPA(PSK/AES/AES) ROKID.TEXT 04:40:a9:57:f1:d3 -59 149,+1 Y CN WPA(PSK/AES/AES) ROKID.GUEST 04:40:a9:57:f1:d2 -59 149,+1 Y CN WPA(PSK/AES/AES) ROKID.CLOUD 04:40:a9:57:f1:d1 -59 149,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.HOMEBASE-5G 6c:b0:ce:11:e5:71 -81 149,+1 Y -- WPA2(PSK/AES/AES) ROKID.TC 04:40:a9:57:f1:d0 -59 149,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.CLOUD 04:40:a9:a1:c1:a2 -80 149 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.IOT 04:40:a9:a1:c1:a1 -81 149 Y CN WPA2(PSK/AES/AES) ROKID.TC 04:40:a9:a1:c1:a0 -80 149 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.OFFICE 04:40:a9:57:fe:55 -44 44,+1 Y CN NONE ROKID.TEXT 04:40:a9:57:fe:53 -44 44,+1 Y CN WPA(PSK/AES/AES) ROKID.GUEST 04:40:a9:57:fe:52 -44 44,+1 Y CN WPA(PSK/AES/AES) ROKID.CLOUD 04:40:a9:57:fe:51 -43 44,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.TC 04:40:a9:57:fe:50 -43 44,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
Can any one git some solution? Thanks!
location services enabled ?
Same problem on 10.14.6, all the BSSID/Macs are returned as null thus it can not find/connect the correct AP.
***** Scanned networks *****
ESSID, BSSID, Ch, RSSI(dBm)
AndroidRepeater, (null), 2, -22
CableWiFi, (null), 1, -86
XFINITY, (null), 1, -84
iPhone, (null), 1, -71
xfinitywifi, (null), 6, -78
Same problem on 10.15
have you downloaded the precompiled binary then this is normal ;-) After downloading the source and compile it by myself it worked for me. at least up to 10.14 / haven't installed 10.15 yet
And also when you have disabled the location services on the system settings which is a bullsh** requirement to get the bssid from the wifi firmware .... :-/
I am actually both ahead and behind a bit on this issue.
On the one hand, I can successfully associate and connect to a specific BSSID. For example,
$ airport-bssid en1 00:f6:63:cd:4b:2f
On the other hand, I do not know how to enter AES/EAP-PEAP (MSCHAPv2) authentication into the command line and, as such, 802.1X cannot authenticate (username & password). My device connects and obtains a self-assigned IP address, but then idles endlessly as it cannot authenticate. As an example,
$ airport-bssid en1 00:f6:63:cd:4b:2f <username> <password>
I am trying to connect to a single access point within a building's wifi mesh. It's due to the fact that some nodes are highly problematic, and connecting to them results in me being disconnected from the internet.
What could help me is knowing how to include my credentials in the command line for authentication. Thanks!!
did you ever figure out how to pass your credentials @vwade ?
or did you figure out an alternative on how to connect to a specific bssid on OSX Mojave?
I'm also seeing (null) BSSID on 10.15 Catalina.
- [X] Built from source
- [X] Enabled location services in System Preferences (and no longer get the prompt)
- [X] Tried with/without sudo
Always get the same result
$ sudo build/Release/airport-bssid
Interface: en0
PHY mode: 802.11ac.
***** Scanned networks *****
ESSID, BSSID, Ch, RSSI(dBm)
Printer, (null), 11, -51
myNet, (null), 100, -76
myNet, (null), 10, -59
Neighbors, (null), 6, -73
****************************
Network scan completed. If you want to connect to a specific BSSID, please enter the command below:
airport-bssid <ifname> <bssid> [<password>]
BSSID always null on 10.14.6, ME293xx/A
Same issue for me :( 13.3.1
As I was getting BSSID always NULL on Monterey, I forked the project and allow to specify SSID and channel to achieve something similar. https://github.com/giuliomoro/airport-ssid-channel
Of course you are still fighting against airport
's setting which may switch network based on its JoinMode
.
@giuliomoro Thank you for this, the tool seems to be helpful for me. One thing you might want to do is to delete the old build of the original tool from ./Build/Release