Re: networkmanager fails to associate (ipw3945)
- From: "dragoran dragoran" <drago01 gmail com>
- To: "Dan Williams" <dcbw redhat com>
- Cc: networkmanager-list gnome org
- Subject: Re: networkmanager fails to associate (ipw3945)
- Date: Thu, 8 Feb 2007 17:16:15 +0100
it does I created a file wpax.txt with the contents you posted (only changed passphrase) and did
wpa_supplicant -D wext -i eth1 -c wpax.txt -dd (to enable debug output to)
and it connects just fine.
I attached the output.
On 2/8/07, Dan Williams <dcbw redhat com> wrote:
On Thu, 2007-02-08 at 13:53 +0100, dragoran wrote:
> Dan Williams wrote:
> > On Thu, 2007-02-08 at 10:29 +0100, dragoran wrote:
> >
> >> I recompiled ieee and ipw3945 and it now works with wpa_supplicant
> >> without any problems (using the wext driver).
> >> but nm keeps asking me for the passphrase and never connects.
> >>
> >
> > Hmm; can you get some logs of NM during the connection attempt? They
> > should get dumped to /var/log/messages. Basically, it may be the case
> > that NM isn't passing the same options to wpa_supplicant as your
> > testcase is using, but we don't know what those options are.
> >
> >
> nm output to syslog is attached (note: ignore selinux messages I did run
> setenforce 0 before doing this test)
Does this wpa_supplicant config file work for you?
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=wheel
ap_scan=1
network={
ssid="mynet"
proto=WPA
key_mgmt=WPA-PSK
scan_ssid=1
pairwise=TKIP
group=TKIP
psk="<your key>"
}
If not, we need to figure out why that doesn't work. The config above
is essentially what NM is pushing to wpa_supplicant.
Dan
wpa_supplicant -D wext -i eth1 -c wpax.txt -dd
Initializing interface 'eth1' conf 'wpax.txt' driver 'wext' ctrl_interface 'N/A'
Configuration file 'wpax.txt' -> '/home/linux/wpax.txt'
Reading configuration file '/home/linux/wpax.txt'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=10 (from group name 'wheel')
ap_scan=1
Line: 6 - start of a new network block
ssid - hexdump_ascii(len=5):
6d 79 6e 65 74 mynet
proto: 0x1
key_mgmt: 0x2
scan_ssid=1 (0x1)
pairwise: 0x8
group: 0x8
PSK (ASCII passphrase) - hexdump_ascii(len=9): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
id=0 ssid='mynet'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=21 WE(source)=16 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf
Own MAC address: 00:18:de:05:f7:9e
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface eth1
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=5):
6d 79 6e 65 74 mynet
Scan timeout - try to get results
Received 345 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:0d:0b:c3:bd:c9 ssid='mynet' wpa_ie_len=24 rsn_ie_len=22 caps=0x11
selected based on WPA IE
Trying to associate with 00:0d:0b:c3:bd:c9 (SSID='mynet' freq=0 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 02 0c 00
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_associate
Setting authentication timeout: 15 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
Wireless event: cmd=0x8b06 len=12
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:00:00:00:00:00 into blacklist
State: ASSOCIATING -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
Wireless event: cmd=0x8b1a len=21
Authentication with 00:00:00:00:00:00 timed out.
BSSID 00:00:00:00:00:00 blacklist count incremented to 2
State: DISCONNECTED -> DISCONNECTED
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan timeout - try to get results
Received 347 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:0d:0b:c3:bd:c9 ssid='mynet' wpa_ie_len=24 rsn_ie_len=22 caps=0x11
selected based on WPA IE
Trying to associate with 00:0d:0b:c3:bd:c9 (SSID='mynet' freq=0 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 02 0c 00
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_associate
Setting authentication timeout: 15 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
Wireless event: cmd=0x8b06 len=12
Wireless event: cmd=0x8b1a len=21
RX EAPOL from 00:0d:0b:c3:bd:c9
RX EAPOL - hexdump(len=99): 02 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 0b d4 3c bb 95 15 f6 f0 17 9e 12 6c c4 58 3f 2e 90 b1 05 97 04 d3 7f d0 fa 9f fd ba 52 10 4a 67 ab 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0b
key_nonce - hexdump(len=32): d4 3c bb 95 15 f6 f0 17 9e 12 6c c4 58 3f 2e 90 b1 05 97 04 d3 7f d0 fa 9f fd ba 52 10 4a 67 ab
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 0b d4 3c bb 95 15 f6 f0 17 9e 12 6c c4 58 3f 2e 90 b1 05 97 04 d3 7f d0 fa 9f fd ba 52 10 4a 67 ab 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:0d:0b:c3:bd:c9 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): c1 ae 8c 49 4b 9d ff b4 33 a5 9d 60 44 37 97 63 9d b1 e6 4e d6 a9 20 9b 05 18 08 9c 08 90 7f 3b
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 0b c1 ae 8c 49 4b 9d ff b4 33 a5 9d 60 44 37 97 63 9d b1 e6 4e d6 a9 20 9b 05 18 08 9c 08 90 7f 3b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 9e 1f 5b 99 3b 71 d2 61 76 41 cc 6f 86 6d 17 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:0d:0b:c3:bd:c9
State: 4WAY_HANDSHAKE -> ASSOCIATED
Associated to a new BSS: BSSID=00:0d:0b:c3:bd:c9
No keys have been configured - skip key clearing
Associated with 00:0d:0b:c3:bd:c9
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RX EAPOL from 00:0d:0b:c3:bd:c9
RX EAPOL - hexdump(len=123): 02 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 0c d4 3c bb 95 15 f6 f0 17 9e 12 6c c4 58 3f 2e 90 b1 05 97 04 d3 7f d0 fa 9f fd ba 52 10 4a 67 ab 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e9 e0 e5 a2 d7 be 04 70 d5 3a 71 39 7f 03 ce 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=119
EAPOL-Key type=254
key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=32 key_data_length=24
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0c
key_nonce - hexdump(len=32): d4 3c bb 95 15 f6 f0 17 9e 12 6c c4 58 3f 2e 90 b1 05 97 04 d3 7f d0 fa 9f fd ba 52 10 4a 67 ab
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 58 e9 e0 e5 a2 d7 be 04 70 d5 3a 71 39 7f 03 ce
WPA: RX EAPOL-Key - hexdump(len=123): 02 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 0c d4 3c bb 95 15 f6 f0 17 9e 12 6c c4 58 3f 2e 90 b1 05 97 04 d3 7f d0 fa 9f fd ba 52 10 4a 67 ab 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e9 e0 e5 a2 d7 be 04 70 d5 3a 71 39 7f 03 ce 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:0d:0b:c3:bd:c9 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 96 25 0f e5 10 26 35 1c 62 f0 0e 11 87 fb bd d1 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:0d:0b:c3:bd:c9
RX EAPOL - hexdump(len=131): 02 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 0d d4 3c bb 95 15 f6 f0 17 9e 12 6c c4 58 3f 2e 90 b1 05 97 04 d3 7f d0 fa 9f fd ba 52 10 4a 67 a7 b1 05 97 04 d3 7f d0 fa 9f fd ba 52 10 4a 67 ac 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3c 23 3c 22 97 e0 1c d6 63 6a 94 59 d2 84 c1 9e 00 20 90 f9 e1 f7 9f 4e 13 da 82 3b c8 66 61 5b 78 f2 14 25 ff 38 c3 6a e4 0a 0c aa c8 6e 45 47 a8 eb
IEEE 802.1X RX: version=2 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0d
key_nonce - hexdump(len=32): d4 3c bb 95 15 f6 f0 17 9e 12 6c c4 58 3f 2e 90 b1 05 97 04 d3 7f d0 fa 9f fd ba 52 10 4a 67 a7
key_iv - hexdump(len=16): b1 05 97 04 d3 7f d0 fa 9f fd ba 52 10 4a 67 ac
key_rsc - hexdump(len=8): 06 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 3c 23 3c 22 97 e0 1c d6 63 6a 94 59 d2 84 c1 9e
WPA: RX EAPOL-Key - hexdump(len=131): 02 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 0d d4 3c bb 95 15 f6 f0 17 9e 12 6c c4 58 3f 2e 90 b1 05 97 04 d3 7f d0 fa 9f fd ba 52 10 4a 67 a7 b1 05 97 04 d3 7f d0 fa 9f fd ba 52 10 4a 67 ac 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3c 23 3c 22 97 e0 1c d6 63 6a 94 59 d2 84 c1 9e 00 20 90 f9 e1 f7 9f 4e 13 da 82 3b c8 66 61 5b 78 f2 14 25 ff 38 c3 6a e4 0a 0c aa c8 6e 45 47 a8 eb
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: RX message 1 of Group Key Handshake from 00:0d:0b:c3:bd:c9 (ver=1)
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 06 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 45 54 1a 4a 12 7f 3d c6 cc d6 b2 aa ee 13 37 b5 00 00
WPA: Key negotiation completed with 00:0d:0b:c3:bd:c9 [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:0d:0b:c3:bd:c9 completed (auth)
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]