The log in OPv4 is different from that in earlier versions. Instead of syslog the data is written to a journal.
Firstly it is worth enabling debugging, Openplotter>Settings>General Settings and click Debugging. you'll see a message saying information will be saved in the system log. Do remember to disable this afterwards or your logs will become very large. You then look at the log data with the journalctl command. Assuming your AP is wlan9 (default) then this command will show any log data for that interface:
Code:
journalctl | grep wlan9
Here is the result when I try to connect to the AP deliberately using the wrong password:
Code:
Dec 05 12:10:03 openplotter wpa_supplicant[692]: wlan9: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=GB
Dec 05 12:16:19 openplotter wpa_supplicant[692]: wlan9: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
Dec 05 12:16:19 openplotter wpa_supplicant[692]: wlan9: AP-STA-POSSIBLE-PSK-MISMATCH 2a:32:66:eb:18:c0
Dec 05 12:16:20 openplotter wpa_supplicant[692]: wlan9: AP-STA-POSSIBLE-PSK-MISMATCH 2a:32:66:eb:18:c0
Dec 05 12:16:21 openplotter wpa_supplicant[692]: wlan9: AP-STA-POSSIBLE-PSK-MISMATCH 2a:32:66:eb:18:c0
Dec 05 12:16:22 openplotter wpa_supplicant[692]: wlan9: AP-STA-POSSIBLE-PSK-MISMATCH 2a:32:66:eb:18:c0
Dec 05 12:25:19 openplotter wpa_supplicant[692]: wlan9: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
Dec 05 12:25:19 openplotter wpa_supplicant[692]: wlan9: AP-STA-POSSIBLE-PSK-MISMATCH 2a:32:66:eb:18:c0
Dec 05 12:25:20 openplotter wpa_supplicant[692]: wlan9: AP-STA-POSSIBLE-PSK-MISMATCH 2a:32:66:eb:18:c0
Dec 05 12:25:21 openplotter wpa_supplicant[692]: wlan9: AP-STA-POSSIBLE-PSK-MISMATCH 2a:32:66:eb:18:c0
Dec 05 12:25:22 openplotter wpa_supplicant[692]: wlan9: AP-STA-POSSIBLE-PSK-MISMATCH 2a:32:66:eb:18:c0
Dec 05 12:28:41 openplotter wpa_supplicant[692]: wlan9: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
Dec 05 12:28:41 openplotter wpa_supplicant[692]: wlan9: AP-STA-POSSIBLE-PSK-MISMATCH 2a:32:66:eb:18:c0
Dec 05 12:28:42 openplotter wpa_supplicant[692]: wlan9: AP-STA-POSSIBLE-PSK-MISMATCH 2a:32:66:eb:18:c0
Dec 05 12:28:43 openplotter wpa_supplicant[692]: wlan9: AP-STA-POSSIBLE-PSK-MISMATCH 2a:32:66:eb:18:c0
Dec 05 12:28:44 openplotter wpa_supplicant[692]: wlan9: AP-STA-POSSIBLE-PSK-MISMATCH 2a:32:66:eb:18:c0
You can see that POSSIBLE-PSK-MISMATCH, this is saying wrong password. Your error messages will be different depending on why the connection failed.
If I try using the correct password the response I get is:
Code:
Dec 05 12:30:54 openplotter wpa_supplicant[692]: wlan9: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
Dec 05 12:30:54 openplotter wpa_supplicant[692]: wlan9: AP-STA-CONNECTED 2a:32:66:eb:18:c0
Dec 05 12:30:54 openplotter wpa_supplicant[692]: wlan9: EAPOL-4WAY-HS-COMPLETED 2a:32:66:eb:18:c0
Dec 05 12:30:57 openplotter dnsmasq-dhcp[875]: DHCPDISCOVER(wlan9) 2a:32:66:eb:18:c0
Dec 05 12:30:57 openplotter dnsmasq-dhcp[875]: DHCPOFFER(wlan9) 10.42.0.43 2a:32:66:eb:18:c0
Dec 05 12:30:57 openplotter dnsmasq-dhcp[875]: DHCPDISCOVER(wlan9) 2a:32:66:eb:18:c0
Dec 05 12:30:57 openplotter dnsmasq-dhcp[875]: DHCPOFFER(wlan9) 10.42.0.43 2a:32:66:eb:18:c0
Dec 05 12:30:58 openplotter dnsmasq-dhcp[875]: DHCPDISCOVER(wlan9) 2a:32:66:eb:18:c0
Dec 05 12:30:58 openplotter dnsmasq-dhcp[875]: DHCPOFFER(wlan9) 10.42.0.43 2a:32:66:eb:18:c0
Dec 05 12:30:59 openplotter dnsmasq-dhcp[875]: DHCPREQUEST(wlan9) 10.42.0.43 2a:32:66:eb:18:c0
Dec 05 12:30:59 openplotter dnsmasq-dhcp[875]: DHCPACK(wlan9) 10.42.0.43 2a:32:66:eb:18:c0
Connection has completed successfully and the device I am connecting to the AP has been given the IP address 10.42.0.43