Re: NM does not work with iwl4965 device



On Wed, 2007-08-08 at 22:58 -0200, Thomas M Steenholdt wrote:
> Dan Williams wrote:
> > 
> > Can you post the output of wpa_supplicant with the "-ddd" option please?
> > I'd love to see _why_ it works for you with a hidden network, because it
> > likely shouldn't.
> > 
> I have performed a number of tests using wpa_supplicant/wireless-tools.
> 
> wpa_supplicant only - ap_scan=1:
> 
> The hidden network is found during the scanning, but is never identified 
> as my network, since wpa_supplicant expects a certain SSID and the 
> hidden net shows an SSID of "" (SSID mismatch).  The device SSID is 
> never set.
> (as soon as I set the device SSID with iwconfig in this mode, 
> wpa_supplicant makes the association happen)
> 
> wpa_supplicant only - ap_scan=2:
> 
> The ESSID is set correctly, and scanning starts. I can't tell for sure 
> if wpa_supplicant finds the right AP during this, logging differs, but 
> running an iwlist wlan0 scanning in another shell shows my hidden 
> network, so it should. Still, scanning just goes on and on and on - 
> never associates.

Can you post the output of "iwlist wlan0 scan" that shows your AP?  The
other issue with AP_SCAN=2 is that you must set the _exact_ options your
AP supports, because wpa_supplicant isn't actually doing a scan, it's
just sending the options to the card and hoping they are correct.  So we
need to ensure that your network block in the wpa_supplicant config file
matches up with the options your network advertises in beacons.

Also, the scan_ssid=1 option might be an issue; are we sure that
mac80211 correctly handles specific SSID scans?  If it doesn't, then
maybe the driver doesn't find the BSSID it needs to associate with,
given that wpa_supplicant isn't actually doing any scans here.

Dan

> So rather that showing it working with AP_SCAN=1 (since that has already 
> been explained - i set the ESSID manually) This is a clean (no help) 
> AP_SCAN=2 failing. Perhaps you'll be able to see something from this. 
> There are a few ioctl errors in there that I can't judge the severity of.
> 
> This is the wpa_supplicant.conf used:
> -----
> ap_scan=1
> 
> network={
>          ssid="tmus_wrt"
>          bssid=00:18:39:BF:EF:2B
>          scan_ssid=1
>          key_mgmt=WPA-PSK
>          proto=WPA2
>          group=CCMP
>          pairwise=CCMP
>          psk="rEmoVedfOrprIvacY"
> }
> -----
> 
> wpa_supplicant output:
> -----
> Initializing interface 'wlan0' conf 
> '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface 
> 'N/A' bridge 'N/A'
> Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> 
> '/etc/wpa_supplicant/wpa_supplicant.conf'
> Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
> ctrl_interface='/var/run/wpa_supplicant'
> ctrl_interface_group='wheel' (DEPRECATED)
> ap_scan=2
> Line: 11 - start of a new network block
> ssid - hexdump_ascii(len=8):
>       74 6d 75 73 5f 77 72 74                           tmus_wrt
> BSSID - hexdump(len=6): 00 18 39 bf ef 2b
> scan_ssid=1 (0x1)
> key_mgmt: 0x2
> proto: 0x2
> group: 0x10
> pairwise: 0x10
> PSK (ASCII passphrase) - hexdump_ascii(len=16): [REMOVED]
> PSK (from passphrase) - hexdump(len=32): [REMOVED]
> Priority group 0
>     id=0 ssid='tmus_wrt'
> Initializing interface (2) 'wlan0'
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
>    capabilities: key_mgmt 0xf enc 0xf
> WEXT: Operstate: linkmode=1, operstate=5
> Own MAC address: 00:13:e8:47:98:19
> wpa_driver_wext_set_wpa
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_countermeasures
> ioctl[SIOCSIWAUTH]: Operation not supported
> WEXT auth param 4 value 0x0 - wpa_driver_wext_set_drop_unencrypted
> ioctl[SIOCSIWAUTH]: Operation not supported
> WEXT auth param 5 value 0x1 - Setting scan request: 0 sec 100000 usec
> ctrl_interface_group=10 (from group name 'wheel')
> Added interface wlan0
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b06 len=8
> State: DISCONNECTED -> SCANNING
> Trying to associate with SSID 'tmus_wrt'
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x1
> WPA: No WPA/RSN IE available from association info
> WPA: Set cipher suites based on configuration
> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
> WPA: clearing AP WPA IE
> WPA: clearing AP RSN IE
> WPA: using GTK CCMP
> WPA: using PTK CCMP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> No keys have been configured - skip key clearing
> wpa_driver_wext_set_drop_unencrypted
> ioctl[SIOCSIWAUTH]: Operation not supported
> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_wext_associate
> Setting authentication timeout: 60 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b1a len=16
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b19 len=8
> Received 730 bytes of scan results (3 BSSes)
> Scan results: 3
> Authentication with 00:00:00:00:00:00 timed out.
> Added BSSID 00:00:00:00:00:00 into blacklist
> State: ASSOCIATING -> DISCONNECTED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> No keys have been configured - skip key clearing
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> Setting scan request: 0 sec 0 usec
> State: DISCONNECTED -> SCANNING
> Trying to associate with SSID 'tmus_wrt'
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x1
> WPA: No WPA/RSN IE available from association info
> WPA: Set cipher suites based on configuration
> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
> WPA: clearing AP WPA IE
> WPA: clearing AP RSN IE
> WPA: using GTK CCMP
> WPA: using PTK CCMP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> No keys have been configured - skip key clearing
> wpa_driver_wext_set_drop_unencrypted
> ioctl[SIOCSIWAUTH]: Operation not supported
> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_wext_associate
> Setting authentication timeout: 60 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b1a len=16
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b19 len=8
> Received 1181 bytes of scan results (5 BSSes)
> Scan results: 5
> Authentication with 00:00:00:00:00:00 timed out.
> BSSID 00:00:00:00:00:00 blacklist count incremented to 2
> State: ASSOCIATING -> DISCONNECTED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> No keys have been configured - skip key clearing
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> Setting scan request: 0 sec 0 usec
> State: DISCONNECTED -> SCANNING
> Trying to associate with SSID 'tmus_wrt'
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x1
> WPA: No WPA/RSN IE available from association info
> WPA: Set cipher suites based on configuration
> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
> WPA: clearing AP WPA IE
> WPA: clearing AP RSN IE
> WPA: using GTK CCMP
> WPA: using PTK CCMP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> No keys have been configured - skip key clearing
> wpa_driver_wext_set_drop_unencrypted
> ioctl[SIOCSIWAUTH]: Operation not supported
> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_wext_associate
> Setting authentication timeout: 60 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b1a len=16
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b19 len=8
> Received 972 bytes of scan results (4 BSSes)
> Scan results: 4
> Authentication with 00:00:00:00:00:00 timed out.
> BSSID 00:00:00:00:00:00 blacklist count incremented to 3
> State: ASSOCIATING -> DISCONNECTED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> No keys have been configured - skip key clearing
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> Setting scan request: 0 sec 0 usec
> State: DISCONNECTED -> SCANNING
> Trying to associate with SSID 'tmus_wrt'
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x1
> WPA: No WPA/RSN IE available from association info
> WPA: Set cipher suites based on configuration
> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
> WPA: clearing AP WPA IE
> WPA: clearing AP RSN IE
> WPA: using GTK CCMP
> WPA: using PTK CCMP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> No keys have been configured - skip key clearing
> wpa_driver_wext_set_drop_unencrypted
> ioctl[SIOCSIWAUTH]: Operation not supported
> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_wext_associate
> Setting authentication timeout: 60 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b1a len=16
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b19 len=8
> Received 972 bytes of scan results (4 BSSes)
> Scan results: 4
> Authentication with 00:00:00:00:00:00 timed out.
> BSSID 00:00:00:00:00:00 blacklist count incremented to 4
> State: ASSOCIATING -> DISCONNECTED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> No keys have been configured - skip key clearing
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> Setting scan request: 0 sec 0 usec
> State: DISCONNECTED -> SCANNING
> Trying to associate with SSID 'tmus_wrt'
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x1
> WPA: No WPA/RSN IE available from association info
> WPA: Set cipher suites based on configuration
> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
> WPA: clearing AP WPA IE
> WPA: clearing AP RSN IE
> WPA: using GTK CCMP
> WPA: using PTK CCMP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> No keys have been configured - skip key clearing
> wpa_driver_wext_set_drop_unencrypted
> ioctl[SIOCSIWAUTH]: Operation not supported
> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_wext_associate
> Setting authentication timeout: 60 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b1a len=16
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b19 len=8
> Received 698 bytes of scan results (3 BSSes)
> Scan results: 3
> Authentication with 00:00:00:00:00:00 timed out.
> BSSID 00:00:00:00:00:00 blacklist count incremented to 5
> State: ASSOCIATING -> DISCONNECTED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> No keys have been configured - skip key clearing
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> Setting scan request: 0 sec 0 usec
> State: DISCONNECTED -> SCANNING
> Trying to associate with SSID 'tmus_wrt'
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x1
> WPA: No WPA/RSN IE available from association info
> WPA: Set cipher suites based on configuration
> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
> WPA: clearing AP WPA IE
> WPA: clearing AP RSN IE
> WPA: using GTK CCMP
> WPA: using PTK CCMP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> No keys have been configured - skip key clearing
> wpa_driver_wext_set_drop_unencrypted
> ioctl[SIOCSIWAUTH]: Operation not supported
> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_wext_associate
> Setting authentication timeout: 60 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b1a len=16
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b19 len=8
> Received 698 bytes of scan results (3 BSSes)
> Scan results: 3
> Authentication with 00:00:00:00:00:00 timed out.
> BSSID 00:00:00:00:00:00 blacklist count incremented to 6
> State: ASSOCIATING -> DISCONNECTED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> No keys have been configured - skip key clearing
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> Setting scan request: 0 sec 0 usec
> State: DISCONNECTED -> SCANNING
> Trying to associate with SSID 'tmus_wrt'
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x1
> WPA: No WPA/RSN IE available from association info
> WPA: Set cipher suites based on configuration
> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
> WPA: clearing AP WPA IE
> WPA: clearing AP RSN IE
> WPA: using GTK CCMP
> WPA: using PTK CCMP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> No keys have been configured - skip key clearing
> wpa_driver_wext_set_drop_unencrypted
> ioctl[SIOCSIWAUTH]: Operation not supported
> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_wext_associate
> Setting authentication timeout: 60 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b1a len=16
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b19 len=8
> Received 698 bytes of scan results (3 BSSes)
> Scan results: 3
> Authentication with 00:00:00:00:00:00 timed out.
> BSSID 00:00:00:00:00:00 blacklist count incremented to 7
> State: ASSOCIATING -> DISCONNECTED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> No keys have been configured - skip key clearing
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> Setting scan request: 0 sec 0 usec
> State: DISCONNECTED -> SCANNING
> Trying to associate with SSID 'tmus_wrt'
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x1
> WPA: No WPA/RSN IE available from association info
> WPA: Set cipher suites based on configuration
> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
> WPA: clearing AP WPA IE
> WPA: clearing AP RSN IE
> WPA: using GTK CCMP
> WPA: using PTK CCMP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> No keys have been configured - skip key clearing
> wpa_driver_wext_set_drop_unencrypted
> ioctl[SIOCSIWAUTH]: Operation not supported
> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_wext_associate
> Setting authentication timeout: 60 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b1a len=16
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b19 len=8
> Received 698 bytes of scan results (3 BSSes)
> Scan results: 3
> ...
> -----
> 
> /Thomas
> 
> _______________________________________________
> NetworkManager-list mailing list
> NetworkManager-list gnome org
> http://mail.gnome.org/mailman/listinfo/networkmanager-list




[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]