Re: NM does not work with iwl4965 device
- From: Ryan Novosielski <novosirj umdnj edu>
- To: networkmanager-list gnome org
- Subject: Re: NM does not work with iwl4965 device
- Date: Wed, 15 Aug 2007 13:26:03 -0400
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Dan Williams wrote:
> On Wed, 2007-08-08 at 22:58 -0200, Thomas M Steenholdt wrote:
>> Dan Williams wrote:
>>> Can you post the output of wpa_supplicant with the "-ddd" option please?
>>> I'd love to see _why_ it works for you with a hidden network, because it
>>> likely shouldn't.
This is not output of a success (which I can give you if you need), but
output from a failure with -ddd. Hopefully this will provide some more
data -- I think this is a problem with the Intel devices, not just with
the newest one (though I hear 2200 is very good):
root novosirj-laptop:/etc/wpa_supplicant# wpa_supplicant -c
/etc/wpa_supplicant/wpa_supplicant.conf -Dwext -ieth1 -ddd
Initializing interface 'eth1' conf
'/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface
'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' ->
'/etc/wpa_supplicant/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
eapol_version=1
ap_scan=2
fast_reauth=1
Line: 5 - start of a new network block
ssid - hexdump_ascii(len=10):
55 4d 44 2d 57 49 46 49 2d 52 UMD-WIFI-R
scan_ssid=1 (0x1)
proto: 0x1
pairwise: 0x8
group: 0x4
eap methods - hexdump(len=16): 00 00 00 00 11 00 00 00 00 00 00 00 00 00
00 00
auth_alg: 0x4
mode=0 (0x0)
key_mgmt: 0x8
identity - hexdump_ascii(len=8):
6e 6f 76 6f 73 69 72 6a novosirj
password - hexdump_ascii(len=8): [REMOVED]
Priority group 0
id=0 ssid='UMD-WIFI-R'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=20 WE(source)=16 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:19:d2:4f:b5:e4
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface eth1
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'UMD-WIFI-R'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x4
Overriding auth_alg selection: 0x4
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: clearing own WPA/RSN IE
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=19
Authentication with 00:00:00:00:00:00 timed out.
Added BSSID 00:00:00:00:00:00 into blacklist
State: ASSOCIATING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'UMD-WIFI-R'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x4
Overriding auth_alg selection: 0x4
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: clearing own WPA/RSN IE
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=19
...I killed it at this point. My supplicant.conf, in case that's
interesting to anyone:
eapol_version=1
ap_scan=2
fast_reauth=1
network={
ssid="UMD-WIFI-R"
scan_ssid=1
proto=WPA
pairwise=TKIP
group=WEP104
eap=LEAP
auth_alg=LEAP
mode=0
key_mgmt=IEEE8021X
identity="novosirj"
password="XXXXXXXX"
}
>> The ESSID is set correctly, and scanning starts. I can't tell for sure
>> if wpa_supplicant finds the right AP during this, logging differs, but
>> running an iwlist wlan0 scanning in another shell shows my hidden
>> network, so it should. Still, scanning just goes on and on and on -
>> never associates.
This is identical to the behavior I see with my card -- there is success
in an iwlist, but there is no eventual association. This can be fixed by
a reboot with the device disabled for some reason.
> Can you post the output of "iwlist wlan0 scan" that shows your AP? The
> other issue with AP_SCAN=2 is that you must set the _exact_ options your
> AP supports, because wpa_supplicant isn't actually doing a scan, it's
> just sending the options to the card and hoping they are correct. So we
> need to ensure that your network block in the wpa_supplicant config file
> matches up with the options your network advertises in beacons.
This is what mine says when I have a problem. I'm somewhat late to the
party, but I am going to post my information:
root novosirj-laptop:/etc/wpa_supplicant# iwlist eth1 scan
eth1 Scan completed :
Cell 01 - Address: 00:07:50:CA:AB:0A
ESSID:"<hidden>"
Protocol:IEEE 802.11b
Mode:Master
Channel:11
Encryption key:off
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s
Quality=76/100 Signal level=-58 dBm Noise
level=-58 dBm
IE: WPA Version 1
Group Cipher : WEP-104
Pairwise Ciphers (1) : TKIP
Authentication Suites (1) : 802.1X
Extra: Last beacon: 508ms ago
Cell 02 - Address: 00:13:7F:C8:07:C0
ESSID:"<hidden>"
Protocol:IEEE 802.11bg
Mode:Master
Channel:1
Encryption key:off
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 6 Mb/s; 9 Mb/s
11 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
48 Mb/s; 54 Mb/s
Quality=45/100 Signal level=-82 dBm Noise
level=-82 dBm
IE: WPA Version 1
Group Cipher : WEP-104
Pairwise Ciphers (1) : TKIP
Authentication Suites (1) : 802.1X
Extra: Last beacon: 472ms ago
Cell 03 - Address: 6E:9B:F3:DB:97:81
ESSID:"HP Printer 1610"
Protocol:IEEE 802.11b
Mode:Ad-Hoc
Channel:6
Encryption key:off
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s
Quality=42/100 Signal level=-84 dBm Noise
level=-84 dBm
Extra: Last beacon: 13404ms ago
Cell 04 - Address: 00:12:DA:AD:0E:40
ESSID:"<hidden>"
Protocol:IEEE 802.11a
Mode:Master
Channel:36
Encryption key:off
Bit Rates:6 Mb/s; 9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s
36 Mb/s; 48 Mb/s; 54 Mb/s
Quality=40/100 Signal level=-85 dBm Noise
level=-87 dBm
IE: WPA Version 1
Group Cipher : WEP-104
Pairwise Ciphers (1) : TKIP
Authentication Suites (1) : 802.1X
Extra: Last beacon: 1960ms ago
> Also, the scan_ssid=1 option might be an issue; are we sure that
> mac80211 correctly handles specific SSID scans? If it doesn't, then
> maybe the driver doesn't find the BSSID it needs to associate with,
> given that wpa_supplicant isn't actually doing any scans here.
I also use scan_ssid=1, but I'm not using the mac80211 stack (still
using Intel's driver).
> Dan
>
>> So rather that showing it working with AP_SCAN=1 (since that has already
>> been explained - i set the ESSID manually) This is a clean (no help)
>> AP_SCAN=2 failing. Perhaps you'll be able to see something from this.
>> There are a few ioctl errors in there that I can't judge the severity of.
>>
>> This is the wpa_supplicant.conf used:
>> -----
>> ap_scan=1
>>
>> network={
>> ssid="tmus_wrt"
>> bssid=00:18:39:BF:EF:2B
>> scan_ssid=1
>> key_mgmt=WPA-PSK
>> proto=WPA2
>> group=CCMP
>> pairwise=CCMP
>> psk="rEmoVedfOrprIvacY"
>> }
>> -----
>>
>> wpa_supplicant output:
>> -----
>> Initializing interface 'wlan0' conf
>> '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface
>> 'N/A' bridge 'N/A'
>> Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' ->
>> '/etc/wpa_supplicant/wpa_supplicant.conf'
>> Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
>> ctrl_interface='/var/run/wpa_supplicant'
>> ctrl_interface_group='wheel' (DEPRECATED)
>> ap_scan=2
>> Line: 11 - start of a new network block
>> ssid - hexdump_ascii(len=8):
>> 74 6d 75 73 5f 77 72 74 tmus_wrt
>> BSSID - hexdump(len=6): 00 18 39 bf ef 2b
>> scan_ssid=1 (0x1)
>> key_mgmt: 0x2
>> proto: 0x2
>> group: 0x10
>> pairwise: 0x10
>> PSK (ASCII passphrase) - hexdump_ascii(len=16): [REMOVED]
>> PSK (from passphrase) - hexdump(len=32): [REMOVED]
>> Priority group 0
>> id=0 ssid='tmus_wrt'
>> Initializing interface (2) 'wlan0'
>> EAPOL: SUPP_PAE entering state DISCONNECTED
>> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
>> EAPOL: SUPP_BE entering state INITIALIZE
>> EAP: EAP entering state DISABLED
>> EAPOL: External notification - portEnabled=0
>> EAPOL: External notification - portValid=0
>> SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
>> capabilities: key_mgmt 0xf enc 0xf
>> WEXT: Operstate: linkmode=1, operstate=5
>> Own MAC address: 00:13:e8:47:98:19
>> wpa_driver_wext_set_wpa
>> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
>> wpa_driver_wext_set_countermeasures
>> ioctl[SIOCSIWAUTH]: Operation not supported
>> WEXT auth param 4 value 0x0 - wpa_driver_wext_set_drop_unencrypted
>> ioctl[SIOCSIWAUTH]: Operation not supported
>> WEXT auth param 5 value 0x1 - Setting scan request: 0 sec 100000 usec
>> ctrl_interface_group=10 (from group name 'wheel')
>> Added interface wlan0
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> State: DISCONNECTED -> SCANNING
>> Trying to associate with SSID 'tmus_wrt'
>> Cancelling scan request
>> WPA: clearing own WPA/RSN IE
>> Automatic auth_alg selection: 0x1
>> WPA: No WPA/RSN IE available from association info
>> WPA: Set cipher suites based on configuration
>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>> WPA: clearing AP WPA IE
>> WPA: clearing AP RSN IE
>> WPA: using GTK CCMP
>> WPA: using PTK CCMP
>> WPA: using KEY_MGMT WPA-PSK
>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04
>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>> No keys have been configured - skip key clearing
>> wpa_driver_wext_set_drop_unencrypted
>> ioctl[SIOCSIWAUTH]: Operation not supported
>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> wpa_driver_wext_associate
>> Setting authentication timeout: 60 sec 0 usec
>> EAPOL: External notification - EAP success=0
>> EAPOL: External notification - EAP fail=0
>> EAPOL: External notification - portControl=Auto
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b1a len=16
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b19 len=8
>> Received 730 bytes of scan results (3 BSSes)
>> Scan results: 3
>> Authentication with 00:00:00:00:00:00 timed out.
>> Added BSSID 00:00:00:00:00:00 into blacklist
>> State: ASSOCIATING -> DISCONNECTED
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> No keys have been configured - skip key clearing
>> EAPOL: External notification - portEnabled=0
>> EAPOL: External notification - portValid=0
>> Setting scan request: 0 sec 0 usec
>> State: DISCONNECTED -> SCANNING
>> Trying to associate with SSID 'tmus_wrt'
>> Cancelling scan request
>> WPA: clearing own WPA/RSN IE
>> Automatic auth_alg selection: 0x1
>> WPA: No WPA/RSN IE available from association info
>> WPA: Set cipher suites based on configuration
>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>> WPA: clearing AP WPA IE
>> WPA: clearing AP RSN IE
>> WPA: using GTK CCMP
>> WPA: using PTK CCMP
>> WPA: using KEY_MGMT WPA-PSK
>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04
>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>> No keys have been configured - skip key clearing
>> wpa_driver_wext_set_drop_unencrypted
>> ioctl[SIOCSIWAUTH]: Operation not supported
>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> wpa_driver_wext_associate
>> Setting authentication timeout: 60 sec 0 usec
>> EAPOL: External notification - EAP success=0
>> EAPOL: External notification - EAP fail=0
>> EAPOL: External notification - portControl=Auto
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b1a len=16
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b19 len=8
>> Received 1181 bytes of scan results (5 BSSes)
>> Scan results: 5
>> Authentication with 00:00:00:00:00:00 timed out.
>> BSSID 00:00:00:00:00:00 blacklist count incremented to 2
>> State: ASSOCIATING -> DISCONNECTED
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> No keys have been configured - skip key clearing
>> EAPOL: External notification - portEnabled=0
>> EAPOL: External notification - portValid=0
>> Setting scan request: 0 sec 0 usec
>> State: DISCONNECTED -> SCANNING
>> Trying to associate with SSID 'tmus_wrt'
>> Cancelling scan request
>> WPA: clearing own WPA/RSN IE
>> Automatic auth_alg selection: 0x1
>> WPA: No WPA/RSN IE available from association info
>> WPA: Set cipher suites based on configuration
>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>> WPA: clearing AP WPA IE
>> WPA: clearing AP RSN IE
>> WPA: using GTK CCMP
>> WPA: using PTK CCMP
>> WPA: using KEY_MGMT WPA-PSK
>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04
>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>> No keys have been configured - skip key clearing
>> wpa_driver_wext_set_drop_unencrypted
>> ioctl[SIOCSIWAUTH]: Operation not supported
>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> wpa_driver_wext_associate
>> Setting authentication timeout: 60 sec 0 usec
>> EAPOL: External notification - EAP success=0
>> EAPOL: External notification - EAP fail=0
>> EAPOL: External notification - portControl=Auto
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b1a len=16
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b19 len=8
>> Received 972 bytes of scan results (4 BSSes)
>> Scan results: 4
>> Authentication with 00:00:00:00:00:00 timed out.
>> BSSID 00:00:00:00:00:00 blacklist count incremented to 3
>> State: ASSOCIATING -> DISCONNECTED
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> No keys have been configured - skip key clearing
>> EAPOL: External notification - portEnabled=0
>> EAPOL: External notification - portValid=0
>> Setting scan request: 0 sec 0 usec
>> State: DISCONNECTED -> SCANNING
>> Trying to associate with SSID 'tmus_wrt'
>> Cancelling scan request
>> WPA: clearing own WPA/RSN IE
>> Automatic auth_alg selection: 0x1
>> WPA: No WPA/RSN IE available from association info
>> WPA: Set cipher suites based on configuration
>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>> WPA: clearing AP WPA IE
>> WPA: clearing AP RSN IE
>> WPA: using GTK CCMP
>> WPA: using PTK CCMP
>> WPA: using KEY_MGMT WPA-PSK
>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04
>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>> No keys have been configured - skip key clearing
>> wpa_driver_wext_set_drop_unencrypted
>> ioctl[SIOCSIWAUTH]: Operation not supported
>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> wpa_driver_wext_associate
>> Setting authentication timeout: 60 sec 0 usec
>> EAPOL: External notification - EAP success=0
>> EAPOL: External notification - EAP fail=0
>> EAPOL: External notification - portControl=Auto
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b1a len=16
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b19 len=8
>> Received 972 bytes of scan results (4 BSSes)
>> Scan results: 4
>> Authentication with 00:00:00:00:00:00 timed out.
>> BSSID 00:00:00:00:00:00 blacklist count incremented to 4
>> State: ASSOCIATING -> DISCONNECTED
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> No keys have been configured - skip key clearing
>> EAPOL: External notification - portEnabled=0
>> EAPOL: External notification - portValid=0
>> Setting scan request: 0 sec 0 usec
>> State: DISCONNECTED -> SCANNING
>> Trying to associate with SSID 'tmus_wrt'
>> Cancelling scan request
>> WPA: clearing own WPA/RSN IE
>> Automatic auth_alg selection: 0x1
>> WPA: No WPA/RSN IE available from association info
>> WPA: Set cipher suites based on configuration
>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>> WPA: clearing AP WPA IE
>> WPA: clearing AP RSN IE
>> WPA: using GTK CCMP
>> WPA: using PTK CCMP
>> WPA: using KEY_MGMT WPA-PSK
>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04
>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>> No keys have been configured - skip key clearing
>> wpa_driver_wext_set_drop_unencrypted
>> ioctl[SIOCSIWAUTH]: Operation not supported
>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> wpa_driver_wext_associate
>> Setting authentication timeout: 60 sec 0 usec
>> EAPOL: External notification - EAP success=0
>> EAPOL: External notification - EAP fail=0
>> EAPOL: External notification - portControl=Auto
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b1a len=16
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b19 len=8
>> Received 698 bytes of scan results (3 BSSes)
>> Scan results: 3
>> Authentication with 00:00:00:00:00:00 timed out.
>> BSSID 00:00:00:00:00:00 blacklist count incremented to 5
>> State: ASSOCIATING -> DISCONNECTED
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> No keys have been configured - skip key clearing
>> EAPOL: External notification - portEnabled=0
>> EAPOL: External notification - portValid=0
>> Setting scan request: 0 sec 0 usec
>> State: DISCONNECTED -> SCANNING
>> Trying to associate with SSID 'tmus_wrt'
>> Cancelling scan request
>> WPA: clearing own WPA/RSN IE
>> Automatic auth_alg selection: 0x1
>> WPA: No WPA/RSN IE available from association info
>> WPA: Set cipher suites based on configuration
>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>> WPA: clearing AP WPA IE
>> WPA: clearing AP RSN IE
>> WPA: using GTK CCMP
>> WPA: using PTK CCMP
>> WPA: using KEY_MGMT WPA-PSK
>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04
>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>> No keys have been configured - skip key clearing
>> wpa_driver_wext_set_drop_unencrypted
>> ioctl[SIOCSIWAUTH]: Operation not supported
>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> wpa_driver_wext_associate
>> Setting authentication timeout: 60 sec 0 usec
>> EAPOL: External notification - EAP success=0
>> EAPOL: External notification - EAP fail=0
>> EAPOL: External notification - portControl=Auto
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b1a len=16
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b19 len=8
>> Received 698 bytes of scan results (3 BSSes)
>> Scan results: 3
>> Authentication with 00:00:00:00:00:00 timed out.
>> BSSID 00:00:00:00:00:00 blacklist count incremented to 6
>> State: ASSOCIATING -> DISCONNECTED
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> No keys have been configured - skip key clearing
>> EAPOL: External notification - portEnabled=0
>> EAPOL: External notification - portValid=0
>> Setting scan request: 0 sec 0 usec
>> State: DISCONNECTED -> SCANNING
>> Trying to associate with SSID 'tmus_wrt'
>> Cancelling scan request
>> WPA: clearing own WPA/RSN IE
>> Automatic auth_alg selection: 0x1
>> WPA: No WPA/RSN IE available from association info
>> WPA: Set cipher suites based on configuration
>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>> WPA: clearing AP WPA IE
>> WPA: clearing AP RSN IE
>> WPA: using GTK CCMP
>> WPA: using PTK CCMP
>> WPA: using KEY_MGMT WPA-PSK
>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04
>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>> No keys have been configured - skip key clearing
>> wpa_driver_wext_set_drop_unencrypted
>> ioctl[SIOCSIWAUTH]: Operation not supported
>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> wpa_driver_wext_associate
>> Setting authentication timeout: 60 sec 0 usec
>> EAPOL: External notification - EAP success=0
>> EAPOL: External notification - EAP fail=0
>> EAPOL: External notification - portControl=Auto
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b1a len=16
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b19 len=8
>> Received 698 bytes of scan results (3 BSSes)
>> Scan results: 3
>> Authentication with 00:00:00:00:00:00 timed out.
>> BSSID 00:00:00:00:00:00 blacklist count incremented to 7
>> State: ASSOCIATING -> DISCONNECTED
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> No keys have been configured - skip key clearing
>> EAPOL: External notification - portEnabled=0
>> EAPOL: External notification - portValid=0
>> Setting scan request: 0 sec 0 usec
>> State: DISCONNECTED -> SCANNING
>> Trying to associate with SSID 'tmus_wrt'
>> Cancelling scan request
>> WPA: clearing own WPA/RSN IE
>> Automatic auth_alg selection: 0x1
>> WPA: No WPA/RSN IE available from association info
>> WPA: Set cipher suites based on configuration
>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>> WPA: clearing AP WPA IE
>> WPA: clearing AP RSN IE
>> WPA: using GTK CCMP
>> WPA: using PTK CCMP
>> WPA: using KEY_MGMT WPA-PSK
>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04
>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>> No keys have been configured - skip key clearing
>> wpa_driver_wext_set_drop_unencrypted
>> ioctl[SIOCSIWAUTH]: Operation not supported
>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>> WEXT: Operstate: linkmode=-1, operstate=5
>> wpa_driver_wext_associate
>> Setting authentication timeout: 60 sec 0 usec
>> EAPOL: External notification - EAP success=0
>> EAPOL: External notification - EAP fail=0
>> EAPOL: External notification - portControl=Auto
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b06 len=8
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b1a len=16
>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>> Wireless event: cmd=0x8b19 len=8
>> Received 698 bytes of scan results (3 BSSes)
>> Scan results: 3
>> ...
>> -----
>>
>> /Thomas
>>
>> _______________________________________________
>> NetworkManager-list mailing list
>> NetworkManager-list gnome org
>> http://mail.gnome.org/mailman/listinfo/networkmanager-list
>
> _______________________________________________
> NetworkManager-list mailing list
> NetworkManager-list gnome org
> http://mail.gnome.org/mailman/listinfo/networkmanager-list
- --
---- _ _ _ _ ___ _ _ _
|Y#| | | |\/| | \ |\ | | |Ryan Novosielski - Systems Programmer II
|$&| |__| | | |__/ | \| _| |novosirj umdnj edu - 973/972.0922 (2-0922)
\__/ Univ. of Med. and Dent.|IST/AST - NJMS Medical Science Bldg - C630
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFGwzcrmb+gadEcsb4RAq90AJ4jgJrXPIYbs+jvTHvMSAbkYFLEywCgzWNE
aanNCJzhWjt0XAfuwIWpLvc=
=YREi
-----END PGP SIGNATURE-----
begin:vcard
fn:Ryan Novosielski
n:Novosielski;Ryan
org:UMDNJ;IST/AST
adr;dom:MSB C630;;185 South Orange Avenue;Newark;NJ;07103
email;internet:novosirj umdnj edu
title:Systems Programmer III
tel;work:(973) 972-0922
tel;fax:(973) 972-7412
tel;pager:(866) 20-UMDNJ
x-mozilla-html:FALSE
version:2.1
end:vcard
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]