taxonomy: add several AP variants, iOS edition.

The contents of the Beacon alter the contents of the signature.
For example the presence of the Spectrum Management bit in
the Beacon from an AP causes iOS devices to include IE#70
(Radio Resource Management).

Gather signatures for a number of client devices using several
different APs with differing Beacons:
+ Fiber GFRG210
+ Google OnHub
+ Google Wifi

Also:
+ iPhone 6s+ and iPad Air gen2 use the same txpow value for 5GHz,
  and we now know they will therefore sometimes send the same
  signature as we've captured several. Switch back to using the
  hostname as a heuristic to distinguish iPad from iPhone for
  iPad Air gen2 5GHz.
+ format of the second half of dhcp.leases was not correct,
  all entries needed an additional column where the ClientID would
  go. We only noticed when trying to use the hostname for iPad Air
  gen2.
+ the earliest pcap files were not anonymized, as we wrote the
  the anonymize_pcap utility somewhat later. The new signatures
  in this CL are from some of those same devices, anonymize
  both the older files and the new.
+ the new pcap files in this CL contain:
  - the Beacon of the AP
  - the Probe Request from the client. We generally provide
    both a Broadcast Probe Request and a Probe directed at the
    specific AP's SSID, because some clients include different IEs.
    Qualcomm radios frequently include 802.11ac (VHT) IEs in their
    2.4GHz Probe if sent to the Broadcast SSID, as some kind of
    proprietary higher bitrate operating mode for 2.4GHz. When
    sending to our specific SSID apparently the right bits are
    not present in the Beacon, and the Probe does not contain VHT IEs.

    Notably, Apple iOS devices have never been seen to send a different
    Probe Request to Broadcast as to a specific SSID, we include both
    variants for completeness and to document that there is no
    difference.
  - the Probe Response from the AP
  - the Authentication packet in both directions
  - the Associate Request from the client and Association Response
    from the AP.
  - the EAPOL exchange for WPA2. Note that being able to analyze the
    collection of EAPOL messages in this archive isn't sufficient to
    discover the Wifi PSK, otherwise people would camp out in the
    parking lot gathering samples.
  - a few packets after joining the WLAN

  We're going to try to make a regular practice of this, to make the
  corpus of collected WLAN traces more useful in the future for
  development of new signature extensions.

Change-Id: I9287e2ee11276301ba03391c89b2cfc7ee10f4d0
202 files changed