airport-bssid icon indicating copy to clipboard operation
airport-bssid copied to clipboard

I can not connect to the BSSID by this tool with macOS mojave 10.14.3

Open buddhist182 opened this issue 5 years ago • 11 comments

I have tried this tool on my mac with version macOS mojave 10.14.3,but it does not work,the detail is : Notice: The interface en0 is in 802.11ac phyMode. ***** Scanned networks ***** ESSID, BSSID, Ch, RSSI(dBm) 12345678, (null), 157, -61 DIRECT-M7-客厅的小米盒子, (null), 1, -62 HUAWEI-176A, (null), 10, -60 PandoraBox-2.4G-B663AB, (null), 10, -61 ROKID.CLOUD, (null), 11, -54 ROKID.GUEST, (null), 11, -54 ROKID.HOMEBASE-2.4G, (null), 11, -70 ROKID.HOMEBASE-5G, (null), 149, -82 ROKID.IOT, (null), 6, -68 ROKID.OFFICE, (null), 157, -88 ROKID.TC, (null), 6, -67 ROKID.TEXT, (null), 1, -59 SmartLife-B06F, (null), 1, -38 Xiaomi_71_2.4G, (null), 1, -52 rokid-22D-1F, (null), 1, -45


All the BSSID is null,and there is many bssid lost,the bssid scanned by airport is :

                        SSID BSSID             RSSI CHANNEL HT CC SECURITY (auth/unicast/group)
                    ROKID.TC 04:40:a9:57:db:60 -69  1       Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                 ROKID.GUEST 04:40:a9:57:db:62 -67  1       Y  CN WPA(PSK/AES/AES)
                ROKID.OFFICE 04:40:a9:57:db:65 -66  1       Y  CN NONE
                 ROKID.CLOUD 04:40:a9:57:e4:f1 -60  1       Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                 ROKID.GUEST 04:40:a9:57:e4:f2 -60  1       Y  CN WPA(PSK/AES/AES)
                  ROKID.TEXT 04:40:a9:57:e4:f3 -61  1       Y  CN WPA(PSK/AES/AES)
                ROKID.OFFICE 04:40:a9:57:e4:f5 -61  1       Y  CN NONE
                 ROKID.GUEST 04:40:a9:a1:c1:b3 -66  6       Y  CN WPA(PSK/AES/AES)
                  ROKID.TEXT 04:40:a9:a1:c1:b4 -65  6       Y  CN WPA(PSK/AES/AES)
                ROKID.OFFICE 04:40:a9:a1:c1:b6 -66  6       Y  CN NONE
                 ROKID.CLOUD 04:40:a9:57:db:61 -66  1       Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                  ROKID.TEXT 04:40:a9:57:db:63 -66  1       Y  CN WPA(PSK/AES/AES)
                    ROKID.TC 04:40:a9:a1:c1:b0 -69  6       Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                   ROKID.IOT 04:40:a9:a1:c1:b1 -66  6       Y  CN WPA2(PSK/AES/AES)
                 ROKID.CLOUD 04:40:a9:a1:c1:b2 -67  6       Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                    ROKID.TC 04:40:a9:57:f1:e0 -53  11      Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                 ROKID.CLOUD 04:40:a9:57:e4:e1 -73  157,+1  Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                 ROKID.GUEST 04:40:a9:57:f1:e2 -53  11      Y  CN WPA(PSK/AES/AES)
                 ROKID.CLOUD 04:40:a9:57:f1:e1 -52  11      Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                ROKID.OFFICE 04:40:a9:57:e4:d5 -67  60,+1   Y  CN NONE
                  ROKID.TEXT 04:40:a9:57:e4:d3 -67  60,+1   Y  CN WPA(PSK/AES/AES)
                 ROKID.GUEST 04:40:a9:57:e4:d2 -67  60,+1   Y  CN WPA(PSK/AES/AES)
                 ROKID.CLOUD 04:40:a9:57:e4:d1 -67  60,+1   Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                    ROKID.TC 04:40:a9:57:e4:d0 -66  60,+1   Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                ROKID.OFFICE 04:40:a9:57:fe:75 -42  11      Y  CN NONE
                  ROKID.TEXT 04:40:a9:57:fe:73 -42  11      Y  CN WPA(PSK/AES/AES)
                 ROKID.GUEST 04:40:a9:57:fe:72 -41  11      Y  CN WPA(PSK/AES/AES)
                 ROKID.CLOUD 04:40:a9:57:fe:71 -41  11      Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
                    ROKID.TC 04:40:a9:57:fe:70 -42  11      Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)
         ROKID.HOMEBASE-2.4G 6c:b0:ce:11:e5:6f -69  11      Y  -- WPA2(PSK/AES/AES)
                 HUAWEI-176A 14:9d:09:04:17:6a -62  10      Y  -- WPA2(PSK/AES/AES)
      PandoraBox-2.4G-B663AB fc:7c:02:b6:63:ab -60  10      Y  CN NONE
                ROKID.OFFICE 04:40:a9:57:f1:e5 -52  11      Y  CN NONE
                  ROKID.TEXT 04:40:a9:57:f1:e3 -52  11      Y  CN WPA(PSK/AES/AES)
                    12345678 50:64:2b:61:4e:d3 -37  6       Y  CN WPA(PSK/TKIP,AES/TKIP) WPA2(PSK/TKIP,AES/TKIP)
                    ROKID.TC 04:40:a9:57:e4:f0 -61  1       Y  CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)

DIRECT-M7-客厅的小米盒子 8e:5a:f8:0e:5c:8a -62 1 Y -- WPA2(PSK/AES/AES) rokid-22D-1F b8:f8:83:e5:6f:61 -46 1,+1 Y -- WPA(PSK/AES,TKIP/TKIP) WPA2(PSK/AES,TKIP/TKIP) SmartLife-B06F 5e:cf:7f:34:b0:6f -38 1 N -- NONE Xiaomi_71_2.4G 8c:be:be:30:71:d0 -53 1 Y -- WPA(PSK/AES,TKIP/TKIP) WPA2(PSK/AES,TKIP/TKIP) ROKID.OFFICE 04:40:a9:a1:bd:25 -85 36 Y CN NONE ROKID.TEXT 04:40:a9:a1:bd:23 -83 36 Y CN WPA(PSK/AES/AES) ROKID.GUEST 04:40:a9:a1:bd:22 -83 36 Y CN WPA(PSK/AES/AES) ROKID.CLOUD 04:40:a9:a1:bd:21 -83 36 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.TC 04:40:a9:a1:bd:20 -84 36 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.TEXT 04:40:a9:a1:c2:63 -86 157 Y CN WPA(PSK/AES/AES) ROKID.OFFICE 04:40:a9:57:e4:e5 -72 157,+1 Y CN NONE ROKID.TEXT 04:40:a9:57:e4:e3 -73 157,+1 Y CN WPA(PSK/AES/AES) ROKID.OFFICE 04:40:a9:a1:c2:65 -89 157 Y CN NONE ROKID.GUEST 04:40:a9:57:e4:e2 -72 157,+1 Y CN WPA(PSK/AES/AES) ROKID.GUEST 04:40:a9:a1:c2:62 -87 157 Y CN WPA(PSK/AES/AES) ROKID.TC 04:40:a9:57:e4:e0 -72 157,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.CLOUD 04:40:a9:a1:c2:61 -87 157 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.TC 04:40:a9:a1:c2:60 -87 157 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.OFFICE 04:40:a9:57:f1:c5 -64 157,+1 Y CN NONE ROKID.OFFICE 04:40:a9:57:fe:65 -54 157,+1 Y CN NONE ROKID.TEXT 04:40:a9:57:f1:c3 -64 157,+1 Y CN WPA(PSK/AES/AES) ROKID.TEXT 04:40:a9:57:fe:63 -54 157,+1 Y CN WPA(PSK/AES/AES) ROKID.GUEST 04:40:a9:57:f1:c2 -64 157,+1 Y CN WPA(PSK/AES/AES) ROKID.GUEST 04:40:a9:57:fe:62 -52 157,+1 Y CN WPA(PSK/AES/AES) ROKID.CLOUD 04:40:a9:57:f1:c1 -64 157,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.CLOUD 04:40:a9:57:fe:61 -54 157,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.TC 04:40:a9:57:f1:c0 -64 157,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.TC 04:40:a9:57:fe:60 -53 157,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) 12345678 50:64:2b:61:4e:d4 -58 157 Y CN WPA(PSK/TKIP,AES/TKIP) WPA2(PSK/TKIP,AES/TKIP) ROKID.OFFICE 04:40:a9:a1:c1:a6 -81 149 Y CN NONE ROKID.TEXT 04:40:a9:a1:c1:a4 -81 149 Y CN WPA(PSK/AES/AES) ROKID.OFFICE 04:40:a9:57:f1:d5 -59 149,+1 Y CN NONE ROKID.GUEST 04:40:a9:a1:c1:a3 -80 149 Y CN WPA(PSK/AES/AES) ROKID.TEXT 04:40:a9:57:f1:d3 -59 149,+1 Y CN WPA(PSK/AES/AES) ROKID.GUEST 04:40:a9:57:f1:d2 -59 149,+1 Y CN WPA(PSK/AES/AES) ROKID.CLOUD 04:40:a9:57:f1:d1 -59 149,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.HOMEBASE-5G 6c:b0:ce:11:e5:71 -81 149,+1 Y -- WPA2(PSK/AES/AES) ROKID.TC 04:40:a9:57:f1:d0 -59 149,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.CLOUD 04:40:a9:a1:c1:a2 -80 149 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.IOT 04:40:a9:a1:c1:a1 -81 149 Y CN WPA2(PSK/AES/AES) ROKID.TC 04:40:a9:a1:c1:a0 -80 149 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.OFFICE 04:40:a9:57:fe:55 -44 44,+1 Y CN NONE ROKID.TEXT 04:40:a9:57:fe:53 -44 44,+1 Y CN WPA(PSK/AES/AES) ROKID.GUEST 04:40:a9:57:fe:52 -44 44,+1 Y CN WPA(PSK/AES/AES) ROKID.CLOUD 04:40:a9:57:fe:51 -43 44,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES) ROKID.TC 04:40:a9:57:fe:50 -43 44,+1 Y CN WPA(PSK/AES/AES) WPA2(PSK/AES/AES)

Can any one git some solution? Thanks!

buddhist182 avatar Apr 30 '19 14:04 buddhist182

location services enabled ?

Moorviper avatar May 02 '19 23:05 Moorviper

Same problem on 10.14.6, all the BSSID/Macs are returned as null thus it can not find/connect the correct AP.

***** Scanned networks *****
                   ESSID,             BSSID,  Ch, RSSI(dBm)
         AndroidRepeater,            (null),   2, -22
               CableWiFi,            (null),   1, -86
                 XFINITY,            (null),   1, -84
                  iPhone,            (null),   1, -71
             xfinitywifi,            (null),   6, -78

sushihangover avatar Aug 23 '19 05:08 sushihangover

Same problem on 10.15

dayongkr avatar Oct 10 '19 11:10 dayongkr

have you downloaded the precompiled binary then this is normal ;-) After downloading the source and compile it by myself it worked for me. at least up to 10.14 / haven't installed 10.15 yet

And also when you have disabled the location services on the system settings which is a bullsh** requirement to get the bssid from the wifi firmware .... :-/

Moorviper avatar Oct 11 '19 00:10 Moorviper

I am actually both ahead and behind a bit on this issue.

On the one hand, I can successfully associate and connect to a specific BSSID. For example,

$ airport-bssid en1 00:f6:63:cd:4b:2f

On the other hand, I do not know how to enter AES/EAP-PEAP (MSCHAPv2) authentication into the command line and, as such, 802.1X cannot authenticate (username & password). My device connects and obtains a self-assigned IP address, but then idles endlessly as it cannot authenticate. As an example,

$ airport-bssid en1 00:f6:63:cd:4b:2f <username> <password>

I am trying to connect to a single access point within a building's wifi mesh. It's due to the fact that some nodes are highly problematic, and connecting to them results in me being disconnected from the internet.

What could help me is knowing how to include my credentials in the command line for authentication. Thanks!!

vwade avatar Dec 10 '19 09:12 vwade

did you ever figure out how to pass your credentials @vwade ?

or did you figure out an alternative on how to connect to a specific bssid on OSX Mojave?

vesper8 avatar Apr 28 '20 22:04 vesper8

I'm also seeing (null) BSSID on 10.15 Catalina.

  • [X] Built from source
  • [X] Enabled location services in System Preferences (and no longer get the prompt)
  • [X] Tried with/without sudo

Always get the same result

$ sudo build/Release/airport-bssid
Interface: en0
PHY mode: 802.11ac.
***** Scanned networks *****
                 ESSID,             BSSID,  Ch, RSSI(dBm)
                 Printer,          (null),  11, -51
                 myNet,            (null), 100, -76
                 myNet,            (null),  10, -59
                 Neighbors,        (null),   6, -73
****************************
Network scan completed. If you want to connect to a specific BSSID, please enter the command below:
airport-bssid <ifname> <bssid> [<password>]

sbliven avatar Nov 12 '20 10:11 sbliven

BSSID always null on 10.14.6, ME293xx/A

gMan1990 avatar Sep 09 '21 03:09 gMan1990

Same issue for me :( 13.3.1

alexgershberg avatar May 25 '23 07:05 alexgershberg

As I was getting BSSID always NULL on Monterey, I forked the project and allow to specify SSID and channel to achieve something similar. https://github.com/giuliomoro/airport-ssid-channel

Of course you are still fighting against airport's setting which may switch network based on its JoinMode.

giuliomoro avatar Aug 15 '23 13:08 giuliomoro

@giuliomoro Thank you for this, the tool seems to be helpful for me. One thing you might want to do is to delete the old build of the original tool from ./Build/Release

eleweek avatar Oct 02 '23 17:10 eleweek