Re: NM does not work with iwl4965 device



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Dan Williams wrote:
> On Wed, 2007-08-08 at 22:58 -0200, Thomas M Steenholdt wrote:
>> Dan Williams wrote:
>>> Can you post the output of wpa_supplicant with the "-ddd" option please?
>>> I'd love to see _why_ it works for you with a hidden network, because it
>>> likely shouldn't.

This is not output of a success (which I can give you if you need), but
output from a failure with -ddd. Hopefully this will provide some more
data -- I think this is a problem with the Intel devices, not just with
the newest one (though I hear 2200 is very good):

root novosirj-laptop:/etc/wpa_supplicant# wpa_supplicant -c
/etc/wpa_supplicant/wpa_supplicant.conf -Dwext -ieth1 -ddd
Initializing interface 'eth1' conf
'/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface
'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' ->
'/etc/wpa_supplicant/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
eapol_version=1
ap_scan=2
fast_reauth=1
Line: 5 - start of a new network block
ssid - hexdump_ascii(len=10):
     55 4d 44 2d 57 49 46 49 2d 52                     UMD-WIFI-R
scan_ssid=1 (0x1)
proto: 0x1
pairwise: 0x8
group: 0x4
eap methods - hexdump(len=16): 00 00 00 00 11 00 00 00 00 00 00 00 00 00
00 00
auth_alg: 0x4
mode=0 (0x0)
key_mgmt: 0x8
identity - hexdump_ascii(len=8):
     6e 6f 76 6f 73 69 72 6a                           novosirj
password - hexdump_ascii(len=8): [REMOVED]
Priority group 0
   id=0 ssid='UMD-WIFI-R'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=20 WE(source)=16 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:19:d2:4f:b5:e4
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface eth1
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'UMD-WIFI-R'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x4
Overriding auth_alg selection: 0x4
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: clearing own WPA/RSN IE
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=19
Authentication with 00:00:00:00:00:00 timed out.
Added BSSID 00:00:00:00:00:00 into blacklist
State: ASSOCIATING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'UMD-WIFI-R'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x4
Overriding auth_alg selection: 0x4
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: clearing own WPA/RSN IE
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=19

...I killed it at this point. My supplicant.conf, in case that's
interesting to anyone:

eapol_version=1
ap_scan=2
fast_reauth=1

network={
       ssid="UMD-WIFI-R"
       scan_ssid=1
       proto=WPA
       pairwise=TKIP
       group=WEP104
       eap=LEAP
       auth_alg=LEAP
       mode=0
       key_mgmt=IEEE8021X
       identity="novosirj"
       password="XXXXXXXX"
}

>> The ESSID is set correctly, and scanning starts. I can't tell for sure 
>> if wpa_supplicant finds the right AP during this, logging differs, but 
>> running an iwlist wlan0 scanning in another shell shows my hidden 
>> network, so it should. Still, scanning just goes on and on and on - 
>> never associates.

This is identical to the behavior I see with my card -- there is success
in an iwlist, but there is no eventual association. This can be fixed by
a reboot with the device disabled for some reason.

> Can you post the output of "iwlist wlan0 scan" that shows your AP?  The
> other issue with AP_SCAN=2 is that you must set the _exact_ options your
> AP supports, because wpa_supplicant isn't actually doing a scan, it's
> just sending the options to the card and hoping they are correct.  So we
> need to ensure that your network block in the wpa_supplicant config file
> matches up with the options your network advertises in beacons.

This is what mine says when I have a problem. I'm somewhat late to the
party, but I am going to post my information:

root novosirj-laptop:/etc/wpa_supplicant# iwlist eth1 scan
eth1      Scan completed :
          Cell 01 - Address: 00:07:50:CA:AB:0A
                    ESSID:"<hidden>"
                    Protocol:IEEE 802.11b
                    Mode:Master
                    Channel:11
                    Encryption key:off
                    Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s
                    Quality=76/100  Signal level=-58 dBm  Noise
level=-58 dBm
                    IE: WPA Version 1
                        Group Cipher : WEP-104
                        Pairwise Ciphers (1) : TKIP
                        Authentication Suites (1) : 802.1X
                    Extra: Last beacon: 508ms ago
          Cell 02 - Address: 00:13:7F:C8:07:C0
                    ESSID:"<hidden>"
                    Protocol:IEEE 802.11bg
                    Mode:Master
                    Channel:1
                    Encryption key:off
                    Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 6 Mb/s; 9 Mb/s
                              11 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
                              48 Mb/s; 54 Mb/s
                    Quality=45/100  Signal level=-82 dBm  Noise
level=-82 dBm
                    IE: WPA Version 1
                        Group Cipher : WEP-104
                        Pairwise Ciphers (1) : TKIP
                        Authentication Suites (1) : 802.1X
                    Extra: Last beacon: 472ms ago
          Cell 03 - Address: 6E:9B:F3:DB:97:81
                    ESSID:"HP Printer 1610"
                    Protocol:IEEE 802.11b
                    Mode:Ad-Hoc
                    Channel:6
                    Encryption key:off
                    Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s
                    Quality=42/100  Signal level=-84 dBm  Noise
level=-84 dBm
                    Extra: Last beacon: 13404ms ago
          Cell 04 - Address: 00:12:DA:AD:0E:40
                    ESSID:"<hidden>"
                    Protocol:IEEE 802.11a
                    Mode:Master
                    Channel:36
                    Encryption key:off
                    Bit Rates:6 Mb/s; 9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s
                              36 Mb/s; 48 Mb/s; 54 Mb/s
                    Quality=40/100  Signal level=-85 dBm  Noise
level=-87 dBm
                    IE: WPA Version 1
                        Group Cipher : WEP-104
                        Pairwise Ciphers (1) : TKIP
                        Authentication Suites (1) : 802.1X
                    Extra: Last beacon: 1960ms ago


> Also, the scan_ssid=1 option might be an issue; are we sure that
> mac80211 correctly handles specific SSID scans?  If it doesn't, then
> maybe the driver doesn't find the BSSID it needs to associate with,
> given that wpa_supplicant isn't actually doing any scans here.

I also use scan_ssid=1, but I'm not using the mac80211 stack (still
using Intel's driver).

> Dan
> 
>> So rather that showing it working with AP_SCAN=1 (since that has already 
>> been explained - i set the ESSID manually) This is a clean (no help) 
>> AP_SCAN=2 failing. Perhaps you'll be able to see something from this. 
>> There are a few ioctl errors in there that I can't judge the severity of.
>>
>> This is the wpa_supplicant.conf used:
>> -----
>> ap_scan=1
>>
>> network={
>>          ssid="tmus_wrt"
>>          bssid=00:18:39:BF:EF:2B
>>          scan_ssid=1
>>          key_mgmt=WPA-PSK
>>          proto=WPA2
>>          group=CCMP
>>          pairwise=CCMP
>>          psk="rEmoVedfOrprIvacY"
>> }
>> -----
>>
>> wpa_supplicant output:
>> -----
>> Initializing interface 'wlan0' conf 
>> '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface 
>> 'N/A' bridge 'N/A'
>> Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> 
>> '/etc/wpa_supplicant/wpa_supplicant.conf'
>> Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
>> ctrl_interface='/var/run/wpa_supplicant'
>> ctrl_interface_group='wheel' (DEPRECATED)
>> ap_scan=2
>> Line: 11 - start of a new network block
>> ssid - hexdump_ascii(len=8):
>>       74 6d 75 73 5f 77 72 74                           tmus_wrt
>> BSSID - hexdump(len=6): 00 18 39 bf ef 2b
>> scan_ssid=1 (0x1)
>> key_mgmt: 0x2
>> proto: 0x2
>> group: 0x10
>> pairwise: 0x10
>> PSK (ASCII passphrase) - hexdump_ascii(len=16): [REMOVED]
>> PSK (from passphrase) - hexdump(len=32): [REMOVED]
>> Priority group 0
>>     id=0 ssid='tmus_wrt'
>> Initializing interface (2) 'wlan0'
>> EAPOL: SUPP_PAE entering state DISCONNECTED
>> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
>> EAPOL: SUPP_BE entering state INITIALIZE
>> EAP: EAP entering state DISABLED
>> EAPOL: External notification - portEnabled=0
>> EAPOL: External notification - portValid=0
>> SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
>>    capabilities: key_mgmt 0xf enc 0xf
>> WEXT: Operstate: linkmode=1, operstate=5
>> Own MAC address: 00:13:e8:47:98:19
>> wpa_driver_wext_set_wpa
>> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_countermeasures
>> ioctl[SIOCSIWAUTH]: Operation not supported
>> WEXT auth param 4 value 0x0 - wpa_driver_wext_set_drop_unencrypted
>> ioctl[SIOCSIWAUTH]: Operation not supported
>> WEXT auth param 5 value 0x1 - Setting scan request: 0 sec 100000 usec
>> ctrl_interface_group=10 (from group name 'wheel')
>> Added interface wlan0
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> State: DISCONNECTED -> SCANNING
>> Trying to associate with SSID 'tmus_wrt'
>> Cancelling scan request
>> WPA: clearing own WPA/RSN IE
>> Automatic auth_alg selection: 0x1
>> WPA: No WPA/RSN IE available from association info
>> WPA: Set cipher suites based on configuration
>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>> WPA: clearing AP WPA IE
>> WPA: clearing AP RSN IE
>> WPA: using GTK CCMP
>> WPA: using PTK CCMP
>> WPA: using KEY_MGMT WPA-PSK
>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>> No keys have been configured - skip key clearing
>> wpa_driver_wext_set_drop_unencrypted
>> ioctl[SIOCSIWAUTH]: Operation not supported
>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> wpa_driver_wext_associate
>> Setting authentication timeout: 60 sec 0 usec
>> EAPOL: External notification - EAP success=0
>> EAPOL: External notification - EAP fail=0
>> EAPOL: External notification - portControl=Auto
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b1a len=16
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b19 len=8
>> Received 730 bytes of scan results (3 BSSes)
>> Scan results: 3
>> Authentication with 00:00:00:00:00:00 timed out.
>> Added BSSID 00:00:00:00:00:00 into blacklist
>> State: ASSOCIATING -> DISCONNECTED
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> No keys have been configured - skip key clearing
>> EAPOL: External notification - portEnabled=0
>> EAPOL: External notification - portValid=0
>> Setting scan request: 0 sec 0 usec
>> State: DISCONNECTED -> SCANNING
>> Trying to associate with SSID 'tmus_wrt'
>> Cancelling scan request
>> WPA: clearing own WPA/RSN IE
>> Automatic auth_alg selection: 0x1
>> WPA: No WPA/RSN IE available from association info
>> WPA: Set cipher suites based on configuration
>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>> WPA: clearing AP WPA IE
>> WPA: clearing AP RSN IE
>> WPA: using GTK CCMP
>> WPA: using PTK CCMP
>> WPA: using KEY_MGMT WPA-PSK
>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>> No keys have been configured - skip key clearing
>> wpa_driver_wext_set_drop_unencrypted
>> ioctl[SIOCSIWAUTH]: Operation not supported
>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> wpa_driver_wext_associate
>> Setting authentication timeout: 60 sec 0 usec
>> EAPOL: External notification - EAP success=0
>> EAPOL: External notification - EAP fail=0
>> EAPOL: External notification - portControl=Auto
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b1a len=16
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b19 len=8
>> Received 1181 bytes of scan results (5 BSSes)
>> Scan results: 5
>> Authentication with 00:00:00:00:00:00 timed out.
>> BSSID 00:00:00:00:00:00 blacklist count incremented to 2
>> State: ASSOCIATING -> DISCONNECTED
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> No keys have been configured - skip key clearing
>> EAPOL: External notification - portEnabled=0
>> EAPOL: External notification - portValid=0
>> Setting scan request: 0 sec 0 usec
>> State: DISCONNECTED -> SCANNING
>> Trying to associate with SSID 'tmus_wrt'
>> Cancelling scan request
>> WPA: clearing own WPA/RSN IE
>> Automatic auth_alg selection: 0x1
>> WPA: No WPA/RSN IE available from association info
>> WPA: Set cipher suites based on configuration
>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>> WPA: clearing AP WPA IE
>> WPA: clearing AP RSN IE
>> WPA: using GTK CCMP
>> WPA: using PTK CCMP
>> WPA: using KEY_MGMT WPA-PSK
>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>> No keys have been configured - skip key clearing
>> wpa_driver_wext_set_drop_unencrypted
>> ioctl[SIOCSIWAUTH]: Operation not supported
>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> wpa_driver_wext_associate
>> Setting authentication timeout: 60 sec 0 usec
>> EAPOL: External notification - EAP success=0
>> EAPOL: External notification - EAP fail=0
>> EAPOL: External notification - portControl=Auto
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b1a len=16
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b19 len=8
>> Received 972 bytes of scan results (4 BSSes)
>> Scan results: 4
>> Authentication with 00:00:00:00:00:00 timed out.
>> BSSID 00:00:00:00:00:00 blacklist count incremented to 3
>> State: ASSOCIATING -> DISCONNECTED
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> No keys have been configured - skip key clearing
>> EAPOL: External notification - portEnabled=0
>> EAPOL: External notification - portValid=0
>> Setting scan request: 0 sec 0 usec
>> State: DISCONNECTED -> SCANNING
>> Trying to associate with SSID 'tmus_wrt'
>> Cancelling scan request
>> WPA: clearing own WPA/RSN IE
>> Automatic auth_alg selection: 0x1
>> WPA: No WPA/RSN IE available from association info
>> WPA: Set cipher suites based on configuration
>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>> WPA: clearing AP WPA IE
>> WPA: clearing AP RSN IE
>> WPA: using GTK CCMP
>> WPA: using PTK CCMP
>> WPA: using KEY_MGMT WPA-PSK
>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>> No keys have been configured - skip key clearing
>> wpa_driver_wext_set_drop_unencrypted
>> ioctl[SIOCSIWAUTH]: Operation not supported
>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> wpa_driver_wext_associate
>> Setting authentication timeout: 60 sec 0 usec
>> EAPOL: External notification - EAP success=0
>> EAPOL: External notification - EAP fail=0
>> EAPOL: External notification - portControl=Auto
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b1a len=16
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b19 len=8
>> Received 972 bytes of scan results (4 BSSes)
>> Scan results: 4
>> Authentication with 00:00:00:00:00:00 timed out.
>> BSSID 00:00:00:00:00:00 blacklist count incremented to 4
>> State: ASSOCIATING -> DISCONNECTED
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> No keys have been configured - skip key clearing
>> EAPOL: External notification - portEnabled=0
>> EAPOL: External notification - portValid=0
>> Setting scan request: 0 sec 0 usec
>> State: DISCONNECTED -> SCANNING
>> Trying to associate with SSID 'tmus_wrt'
>> Cancelling scan request
>> WPA: clearing own WPA/RSN IE
>> Automatic auth_alg selection: 0x1
>> WPA: No WPA/RSN IE available from association info
>> WPA: Set cipher suites based on configuration
>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>> WPA: clearing AP WPA IE
>> WPA: clearing AP RSN IE
>> WPA: using GTK CCMP
>> WPA: using PTK CCMP
>> WPA: using KEY_MGMT WPA-PSK
>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>> No keys have been configured - skip key clearing
>> wpa_driver_wext_set_drop_unencrypted
>> ioctl[SIOCSIWAUTH]: Operation not supported
>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> wpa_driver_wext_associate
>> Setting authentication timeout: 60 sec 0 usec
>> EAPOL: External notification - EAP success=0
>> EAPOL: External notification - EAP fail=0
>> EAPOL: External notification - portControl=Auto
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b1a len=16
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b19 len=8
>> Received 698 bytes of scan results (3 BSSes)
>> Scan results: 3
>> Authentication with 00:00:00:00:00:00 timed out.
>> BSSID 00:00:00:00:00:00 blacklist count incremented to 5
>> State: ASSOCIATING -> DISCONNECTED
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> No keys have been configured - skip key clearing
>> EAPOL: External notification - portEnabled=0
>> EAPOL: External notification - portValid=0
>> Setting scan request: 0 sec 0 usec
>> State: DISCONNECTED -> SCANNING
>> Trying to associate with SSID 'tmus_wrt'
>> Cancelling scan request
>> WPA: clearing own WPA/RSN IE
>> Automatic auth_alg selection: 0x1
>> WPA: No WPA/RSN IE available from association info
>> WPA: Set cipher suites based on configuration
>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>> WPA: clearing AP WPA IE
>> WPA: clearing AP RSN IE
>> WPA: using GTK CCMP
>> WPA: using PTK CCMP
>> WPA: using KEY_MGMT WPA-PSK
>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>> No keys have been configured - skip key clearing
>> wpa_driver_wext_set_drop_unencrypted
>> ioctl[SIOCSIWAUTH]: Operation not supported
>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> wpa_driver_wext_associate
>> Setting authentication timeout: 60 sec 0 usec
>> EAPOL: External notification - EAP success=0
>> EAPOL: External notification - EAP fail=0
>> EAPOL: External notification - portControl=Auto
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b1a len=16
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b19 len=8
>> Received 698 bytes of scan results (3 BSSes)
>> Scan results: 3
>> Authentication with 00:00:00:00:00:00 timed out.
>> BSSID 00:00:00:00:00:00 blacklist count incremented to 6
>> State: ASSOCIATING -> DISCONNECTED
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> No keys have been configured - skip key clearing
>> EAPOL: External notification - portEnabled=0
>> EAPOL: External notification - portValid=0
>> Setting scan request: 0 sec 0 usec
>> State: DISCONNECTED -> SCANNING
>> Trying to associate with SSID 'tmus_wrt'
>> Cancelling scan request
>> WPA: clearing own WPA/RSN IE
>> Automatic auth_alg selection: 0x1
>> WPA: No WPA/RSN IE available from association info
>> WPA: Set cipher suites based on configuration
>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>> WPA: clearing AP WPA IE
>> WPA: clearing AP RSN IE
>> WPA: using GTK CCMP
>> WPA: using PTK CCMP
>> WPA: using KEY_MGMT WPA-PSK
>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>> No keys have been configured - skip key clearing
>> wpa_driver_wext_set_drop_unencrypted
>> ioctl[SIOCSIWAUTH]: Operation not supported
>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> wpa_driver_wext_associate
>> Setting authentication timeout: 60 sec 0 usec
>> EAPOL: External notification - EAP success=0
>> EAPOL: External notification - EAP fail=0
>> EAPOL: External notification - portControl=Auto
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b1a len=16
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b19 len=8
>> Received 698 bytes of scan results (3 BSSes)
>> Scan results: 3
>> Authentication with 00:00:00:00:00:00 timed out.
>> BSSID 00:00:00:00:00:00 blacklist count incremented to 7
>> State: ASSOCIATING -> DISCONNECTED
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> No keys have been configured - skip key clearing
>> EAPOL: External notification - portEnabled=0
>> EAPOL: External notification - portValid=0
>> Setting scan request: 0 sec 0 usec
>> State: DISCONNECTED -> SCANNING
>> Trying to associate with SSID 'tmus_wrt'
>> Cancelling scan request
>> WPA: clearing own WPA/RSN IE
>> Automatic auth_alg selection: 0x1
>> WPA: No WPA/RSN IE available from association info
>> WPA: Set cipher suites based on configuration
>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>> WPA: clearing AP WPA IE
>> WPA: clearing AP RSN IE
>> WPA: using GTK CCMP
>> WPA: using PTK CCMP
>> WPA: using KEY_MGMT WPA-PSK
>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>> No keys have been configured - skip key clearing
>> wpa_driver_wext_set_drop_unencrypted
>> ioctl[SIOCSIWAUTH]: Operation not supported
>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> wpa_driver_wext_associate
>> Setting authentication timeout: 60 sec 0 usec
>> EAPOL: External notification - EAP success=0
>> EAPOL: External notification - EAP fail=0
>> EAPOL: External notification - portControl=Auto
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b1a len=16
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b19 len=8
>> Received 698 bytes of scan results (3 BSSes)
>> Scan results: 3
>> ...
>> -----
>>
>> /Thomas
>>
>> _______________________________________________
>> NetworkManager-list mailing list
>> NetworkManager-list gnome org
>> http://mail.gnome.org/mailman/listinfo/networkmanager-list
> 
> _______________________________________________
> NetworkManager-list mailing list
> NetworkManager-list gnome org
> http://mail.gnome.org/mailman/listinfo/networkmanager-list

- --
 ---- _  _ _  _ ___  _  _  _
 |Y#| |  | |\/| |  \ |\ |  | |Ryan Novosielski - Systems Programmer II
 |$&| |__| |  | |__/ | \| _| |novosirj umdnj edu - 973/972.0922 (2-0922)
 \__/ Univ. of Med. and Dent.|IST/AST - NJMS Medical Science Bldg - C630
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGwzcrmb+gadEcsb4RAq90AJ4jgJrXPIYbs+jvTHvMSAbkYFLEywCgzWNE
aanNCJzhWjt0XAfuwIWpLvc=
=YREi
-----END PGP SIGNATURE-----
begin:vcard
fn:Ryan Novosielski
n:Novosielski;Ryan
org:UMDNJ;IST/AST
adr;dom:MSB C630;;185 South Orange Avenue;Newark;NJ;07103
email;internet:novosirj umdnj edu
title:Systems Programmer III
tel;work:(973) 972-0922
tel;fax:(973) 972-7412
tel;pager:(866) 20-UMDNJ
x-mozilla-html:FALSE
version:2.1
end:vcard



[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]